The vulnerabilities, tracked as CVE-2025-33183 and CVE-2025-33184, stem from improper control of code generation in Python components and could allow authenticated local attackers to inject malicious code with severe consequences.
Both vulnerabilities carry a CVSS v3.1 base score of 7.8, classified as High severity, and affect all platforms running the Isaac-GR00T N1.5 robotics platform.
The flaws reside in a Python component where attackers with local access and low privileges could exploit insufficient input validation to execute arbitrary code injection attacks.
If successfully exploited, these vulnerabilities could lead to unauthorized code execution, privilege escalation, sensitive information disclosure, and data tampering.
The attack vector is local (AV:L), requires low attack complexity (AC:L), necessitates low privileges (PR:L), and requires no user interaction (UI:N).
This means an attacker with basic local system access could potentially compromise the entire robotic system without any special administrative rights or user involvement.
The vulnerability impacts all versions of NVIDIA Isaac-GR00T that do not include code commit 7f53666.
NVIDIA recommends installing the patched software available on GitHub at commit 7f53666 of the NVIDIA Isaac-GR00T repository immediately. Any code branch incorporating this specific commit will resolve both vulnerabilities.
| CVE ID | Product | Severity | CVSS Score | CWE | Vector | Impact |
|---|---|---|---|---|---|---|
| CVE-2025-33183 | NVIDIA Isaac-GR00T N1.5 | High | 7.8 | CWE-94 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | Code Execution, Privilege Escalation, Information Disclosure, Data Tampering |
| CVE-2025-33184 | NVIDIA Isaac-GR00T N1.5 | High | 7.8 | CWE-94 | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | Code Execution, Privilege Escalation, Information Disclosure, Data Tampering |
Organizations deploying NVIDIA Isaac-GR00T in production environments should prioritize patching systems immediately.
The vulnerability’s local attack vector limits exposure to users with system access, but robotics deployments often operate in shared environments where this risk is significant.
NVIDIA credits Peter Girnus from Trend Micro Zero Day Initiative for responsibly disclosing these vulnerabilities.
Find this Story Interesting! Follow us on Google News, LinkedIn and X to Get More Instant Updates
The post NVIDIA’s Isaac-GROOT Robotics Platform Vulnerability Lets Attackers Inject Malicious Code appeared first on Cyber Security News.
A newly identified two-component Remote Access Trojan (RAT) toolkit built in Rust, dubbed SpankRAT, is…
WASHINGTON (AP) — The House rejected a resolution Thursday requiring President Donald Trump to withdraw U.S. forces…
We've known for a couple of years that Top Gun 3 was going to happen,…
NEW CASTLE, Ind. (WOWO) — A local political battle over yard signs has escalated into…
INDIANAPOLIS, Ind. (WOWO) — The Public Safety and Criminal Justice Committee of the Indianapolis City-County…
A view of the damaged B1 bridge, a day after it was destroyed by an…
This website uses cookies.