CVE-2026-24207: About NVIDIA Triton Inference Server (21st May 2026)

Preface: The NVIDIA Triton Inference Server natively supports gRPC as one of its primary communication protocols for the client API. Furthermore, gRPC can also be used for health checks, statistics, and model loading/unloading operations, not just inference requests. Inference requests arrive at the server via either HTTP/REST or GRPC or by the C API and are then routed to the appropriate per-model scheduler.

Background: NVIDIA’s security bulletin did not provide details. I speculate the cause of CVE-2026-24207 is as follows:

The Bypass Logic

A standard gRPC request path is canonical: /package.Service/Method. If an attacker crafts a raw HTTP/2 frame where the :path pseudo-header is package[.]Service/Method (missing the leading /), the following happens:

Step1 – Routing Success: The gRPC server sees the request and correctly identifies which handler to trigger, even without the leading slash.

Step2 – Match Failure: The authorization engine (like grpc/authz) checks the path against its rules. It looks for a literal match for /package[.]Service/Method. Since the incoming path is package[.]Service/Method, the Deny rule does not trigger.

Step3 – Fallback Triggered: Because the specific deny rule failed to match, the engine falls back to its next rule, which is typically a “catch-all” Allow rule.

My question is that gRPC has an authorization bypass vulnerability affecting all gRPC-Go (google[.]golang[.]org/grpc) versions prior to 1.79.3. However, Triton’s gRPC functionality is primarily implemented in src/grpc/grpc_server[.]cc. Can I say that the CVE-2026-24207 vulnerability occurs on the client side rather than the server side? Because for edge deployments, Triton Server is also provided as a shared library, and its API allows the full functionality of the server to be directly integrated into the application. What are your thoughts on this?

If you are using the standard Triton Inference Server binary (which is built in C++), it uses the C++ gRPC implementation, not the Go version. Therefore, it is not vulnerable to CVE-2026-24207 on the server side.

Vulnerability details: CVE-2026-24207 – NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause an authentication bypass. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.

Official announcement: Please refer to the link for details – https://nvidia.custhelp.com/app/answers/detail/a_id/5828

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.