[CIVN-2025-0388] Multiple Vulnerabilities in NVIDIA Isaac Launchable

By Published On: December 26, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in NVIDIA Isaac Launchable 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
Nvidia Isaac Launchable all versions prior to 1.1
Overview
Multiple vulnerabilities have been reported in Nvidia Issac launchable which could allow an attacker to perform remote code execution, escalate privileges, bypass authentication mechanisms, launch denial of service attacks, disclose sensitive information and tamper data, potentially corrupting simulations or underlying datasets on the targeted system.
Target Audience:
All organizations and individuals using Nvidia products.
Risk Assessment:
High risk of data tamper, full system compromise.
Impact Assessment:
Potential for remote code execution, which may lead to complete system compromise.
Description
NVIDIA Issac consists of libraries, application frameworks, and AI models that accelerate AI robot development such as autonomous mobile robots (AMRs).
Multiple vulnerabilities exist in NVIDIA Isaac-Launchable due to hard-coded credentials embedded within the software which enable an attacker to gain unauthorized access without valid credentials and execution with unnecessary privileges.
Successful exploitation of these vulnerabilities could allow a remote attacker to perform arbitrary code execution, escalate privileges, bypass authentication mechanisms, launch denial of service attacks, disclose sensitive information and tamper data, potentially corrupting simulations or underlying datasets on the targeted system.
Solution
Apply appropriate fix/patches as mentioned in Nvidia security bulletin:
https://nvidia.custhelp.com/app/answers/detail/a_id/5749
Vendor Information
Nvidia
https://www.nvidia.com/en-us/security/
References
Nvidia Security Bulletin
https://nvidia.custhelp.com/app/answers/detail/a_id/5749
https://www.nvidia.com/en-us/security/
CVE Name
CVE-2025-33222
CVE-2025-33223
CVE-2025-33224
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=fCrK
—–END PGP SIGNATURE—–

Share this article