Security updates: Malicious code gaps in GPU drivers from Nvidia closed

Attackers can attack Linux and Windows systems with graphics card drivers or the vGPU software from Nvidia.

listen Print view
Time-to-update button on a keyboard

(Image: Artur Szczybylo/Shutterstock.com)

2 min. read

Owners of Nvidia graphics cards should ensure that the latest GPU drivers are installed and that the vGPU software is up to date. Otherwise, attackers can exploit several vulnerabilities to attack Linux and Windows PCs.

According to a warning message, in the worst case scenario, malicious code can get onto systems and compromise them completely. The majority of software vulnerabilities in GPU drivers for Linux and Windows are classified as"high" (e.g. CVE-2025-23276 and CVE-2025-23277).

If an attacker successfully exploits the first vulnerability, they can gain higher user rights and then execute their own code. In such cases, attackers usually gain full control over computers. In the second case, information can be leaked or DoS states can occur, which triggers crashes.

Videos by heise

It is not yet clear how such attacks could take place. There are currently no reports of attacks. However, this can change quickly and admins should react promptly and install secure versions against the attacks described.

Nvidia vGPU software is vulnerable in several places. Two vulnerabilities have been assigned the threat level"high" (CVE-2025-23283, CVE-2025-23284). They affect the virtual GPU manager in the context of Linux hypervisors. Malicious code can be executed at these points, for example. Attackers could also manipulate data and cause services to crash.

Nvidia's developers assure that the Windows GPU drivers 539.41, 573.48, 539.41, 573.48 and 577.00 are protected against the attacks described. Under Linux, these are 535.261.03, 570.172.08, 535.261.03, 570.172.08, 575.64.05, 535.261.03, 570.172.08 and 575.64.05. vGPU versions 6.11 and 18.4 have been repaired.

Most recently, vulnerabilities discovered in Nvidia's Triton Inference Server during the Pwn2Own hacker competition in May 2025 made headlines.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.