The Zero Day Initiative (ZDI) has disclosed a critical vulnerability in NVIDIA AIStore, a scalable object storage system tailored for AI workloads. The vulnerability, CVE-2025-33186, is an authentication bypass with a CVSS score of 9.8, stemming from the use of hard-coded credentials. This flaw allows a remote, unauthenticated attacker to gain full access to the AIStore platform, posing a severe risk to the sensitive data and machine learning models it manages. The disclosure highlights the critical need for robust security in the underlying infrastructure that powers modern AI development and deployment.
ZDI published advisories for two vulnerabilities in NVIDIA AIStore on November 14, 2025.
CVE-2025-33186 - NVIDIA AIStore Authentication Bypass Vulnerability
CVE-2025-33185 - NVIDIA AIStore Information Disclosure Vulnerability
Administrators of NVIDIA AIStore deployments are urged to review the vendor's advisories and apply the necessary patches.
There is no indication of active exploitation in the wild at the time of disclosure. However, given the critical severity and the simplicity of exploiting hard-coded credentials, it is highly likely that threat actors will develop exploits for this vulnerability quickly.
The compromise of an AI storage platform like AIStore can have devastating consequences. Attackers could steal valuable intellectual property in the form of proprietary datasets and trained AI models. They could also conduct data poisoning attacks by manipulating the training data, subtly corrupting the behavior of AI models in a way that is difficult to detect. For organizations heavily invested in AI, such a breach could undermine the integrity of their entire AI/ML pipeline and erode customer trust.
log_source: AIStore AuthN service logs.network_traffic_pattern: Monitor for access to AIStore management interfaces from untrusted or external IP addresses.api_endpoint: Look for anomalous API calls to administrative functions within AIStore that originate from unexpected sources.CVE-2025-33186 and CVE-2025-33185. This is a direct implementation of D3FEND's Software Update (D3-SU).Apply the patches released by NVIDIA to fix the hard-coded credential and information disclosure vulnerabilities.
Mapped D3FEND Techniques:
Avoid hard-coded credentials in all applications and configurations. Use secrets management solutions.
Mapped D3FEND Techniques:
Restrict network access to the AIStore platform, ensuring it is not exposed to the internet.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats