SB2025121642 - Multiple vulnerabilities in Red Hat AI Inference Server (CUDA) 



SB2025121642 - Multiple vulnerabilities in Red Hat AI Inference Server (CUDA)

Published: December 16, 2025

Security Bulletin ID SB2025121642
Severity
High
Patch available
YES
Number of vulnerabilities 11
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 9% Medium 73% Low 18%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Resource exhaustion (CVE-ID: CVE-2025-22868)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the jws package does not properly control consumption of internal resources when handling malformed tokens. A remote attacker can pass a malformed JWT token to the application, trigger resource exhaustion and perform a denial of service (DoS) attack.


2) Resource exhaustion (CVE-ID: CVE-2025-22869)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources within the ssh package when handling clients that complete the key exchange slowly, or not at all. A remote user can trigger resource exhaustion and perform a denial of service (DoS) attack.


3) UNIX symbolic link following (CVE-ID: CVE-2025-52565)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a symlink following issue related to /dev/console mounts. A local user can escape the container using a malicious config and escalate privileges on the system.


4) Resource exhaustion (CVE-ID: CVE-2025-59375)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger large dynamic memory allocations via a small document and perform a denial of service (DoS) attack.


5) Buffer overflow (CVE-ID: CVE-2025-62164)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the Completions API endpoint when processing user-supplied prompt embeddings. A remote user can send specially crafted data to the application, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Improper validation of array index (CVE-ID: CVE-2025-62372)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to an error when handling multimodal embeddings. A remote user can send multimodal embedding inputs with correct ndim but incorrect shape, regardless of whether the model is intended to support such inputs and perform a denial of service attack. 


7) Improper authentication (CVE-ID: CVE-2025-62593)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to improper authentication implemented on "/api/jobs" and "/api/job_agent/jobs/" endpoints. A remote attacker can trick the victim into visiting a malicious website and force the victim's browser into sending a crafted payload to the affected endpoints available at the developer's machine, resulting in remote code execution. 


8) Protection mechanism failure (CVE-ID: CVE-2025-66448)

The vulnerability allows a remote user to execute arbitrary code on the system.

The vulnerability exists due to the application ignores the "trust_remote_code=False" option set in vllm.transformers_utils.config.get_config file. A remote user can load a model config that contains an auto_map entry and execute arbitrary Python code from a remote repository referenced in auto_map string.


9) Resource exhaustion (CVE-ID: CVE-2025-66506)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources within the identity.extractIssuerURL() function when parsing untrusted arguments. A remote attacker can pass a specially crafted request with a malicious OIDC identity token to trigger resource exhaustion and perform a denial of service (DoS) attack.


10) Out-of-bounds write (CVE-ID: CVE-2025-9230)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when trying to decrypt CMS messages encrypted using password based encryption. A remote attacker can trigger an out-of-bounds write and execute arbitrary code on the target system.

Successful exploitation of the vulnerability requires that password based (PWRI) encryption support in CMS messages is enabled. 


11) Uncontrolled Recursion (CVE-ID: CVE-2025-9714)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to uncontrolled recursion in XPath evaluation within the xmlXPathRunEval() function in xpath.c. A remote attacker can pass specially crated XML data to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.