NVIDIA has issued an urgent security update for its DGX Spark platform, a compact AI supercomputer designed for local development and research. The bulletin addresses a list of 14 vulnerabilities, including a critical flaw that could allow attackers to bypass system protections and gain deep control over the hardware.
If you are using a DGX Spark GB10 unit for AI workloads or data science, immediate action is required to secure your research and proprietary models.
The most alarming vulnerability in this patch batch is CVE-2025-33187, which carries a Critical CVSS score of 9.3.
This vulnerability resides in the SROOT (Secure Root) component of the system. In a worst-case scenario, an attacker with privileged access (such as a compromised root account on the OS) can pivot to gain access to SoC (System-on-Chip) protected areas.
This isn’t just about crashing an application. A successful exploit here allows an attacker to execute arbitrary code, tamper with data, or escalate privileges to a level that persists beyond standard operating system controls. For AI researchers, this puts confidential datasets and proprietary model weights at risk of theft or subtle manipulation.
The security update doesn’t stop at SROOT. NVIDIA has patched multiple high-severity issues affecting the system’s firmware and hardware resource controls:
- Hardware Resource Tampering (CVE-2025-33188): Rated High (CVSS 8.0), this flaw allows an attacker to tamper with hardware resources, potentially leading to data corruption or a complete denial of service.
- Firmware Out-of-Bounds Write (CVE-2025-33189): Also rated High (CVSS 7.8), this vulnerability in the SROOT firmware allows an attacker to cause an out-of-bound write, a classic vector for achieving code execution or crashing the system.
The remaining patches cover a spectrum of medium and low-severity issues, including memory read errors (CVE-2025-33191) and NULL pointer dereferences (CVE-2025-33197), which could be exploited to crash services or leak information.
NVIDIA has released a consolidated fix for all 14 vulnerabilities. The vulnerabilities affect all versions of NVIDIA DGX OS on the DGX Spark GB10 prior to version OTA0.
Administrators and users must update their DGX Spark units to Version OTA0 immediately to close these security gaps. Given the “Critical” rating of the SROOT vulnerability, leaving these systems unpatched exposes them to complete system compromise.