NVIDIA has released a security update to fix a critical vulnerability affecting its NVIDIA App for Windows. The flaw, tracked as CVE-2025-23358, could allow local attackers to execute arbitrary code and gain elevated privileges on vulnerable systems. The issue resides in the application’s installer component and represents a serious risk for users operating unpatched versions.
The vulnerability arises from a search path element issue (classified under CWE-427) in the installer. This flaw allows an attacker with limited local access to manipulate the application’s search path and inject malicious code, which the system may execute with elevated privileges. Although the attack requires user interaction to trigger, successful exploitation results in complete system compromise, granting the attacker full administrative control.
With a CVSS v3.1 base score of 8.2, CVE-2025-23358 is rated High severity. While the attack vector is local—requiring either physical or logical access to the target computer—the combination of low attack complexity and privilege escalation potential makes it especially concerning for multi-user systems and enterprise environments.
Vulnerability Details and Impact
The exploit scenario typically involves an attacker planting a malicious file in a directory where the vulnerable installer searches for legitimate components. When a user runs the installer, it inadvertently loads the attacker’s file, allowing arbitrary code execution. Once executed, the attacker gains the ability to perform privileged actions, such as altering system configurations, installing additional malware, or accessing sensitive data.
All NVIDIA App for Windows versions prior to 11.0.5.260 are affected. NVIDIA has addressed the issue in version 11.0.5.260, and users are strongly advised to update immediately by downloading the latest release from the official NVIDIA App website. Systems running older versions remain at risk of exploitation.
| CVE ID | Affected Product | Severity | CVSS Score |
|---|---|---|---|
| CVE-2025-23358 | NVIDIA App for Windows (all versions before 11.0.5.260) | High | 8.2 |
This incident highlights the growing threat posed by vulnerabilities in installer components, which often operate with elevated privileges during installation. Attackers frequently exploit these weaknesses to bypass security restrictions and gain deep system access.
To mitigate the risk, NVIDIA recommends the following actions:
- Update immediately to version 11.0.5.260 or later.
- Download updates only from NVIDIA’s official website to avoid tampered installers.
- In organizational environments, system administrators should audit their software inventories to detect outdated versions and deploy the patched release across all endpoints.
For enterprises managing fleets of NVIDIA-equipped systems, prompt patch deployment is crucial. Security teams should verify that the update is applied consistently and monitor for any signs of attempted exploitation. Keeping third-party applications updated remains a vital component of defense against privilege escalation and local code execution attacks.
