NVIDIA DGX OS: Critical SSH Key Vulnerability Exposes Systems

NVIDIA DGX OS: Critical SSH Key Vulnerability Exposes Systems

The National Vulnerability Database has disclosed CVE-2026-24218, a high-severity vulnerability affecting NVIDIA DGX OS. The issue stems from the factory provisioning process, where cloning a base image leads to identical SSH host keys being deployed across multiple systems. This severe misconfiguration, categorized as CWE-321 (Improperly Implemented Cryptographic Algorithm), undermines the fundamental security of SSH.

This shared cryptographic identifier allows for host impersonation and man-in-the-middle attacks. An attacker leveraging this vulnerability could achieve significant impact, including code execution, data tampering, escalation of privileges, information disclosure, and denial of service. The CVSS score of 8.1 (High) reflects the critical nature, with a vector indicating network exploitability and high impact on confidentiality, integrity, and availability.

For organizations running NVIDIA DGX OS, this isn’t a hypothetical threat. It means that every system provisioned from that same base image is cryptographically indistinguishable from the attacker’s perspective, making network-level attacks significantly easier to execute. This vulnerability essentially provides a backdoor for attackers to seamlessly blend in and control affected DGX systems.

What This Means For You

  • If your organization uses NVIDIA DGX OS, you MUST address CVE-2026-24218 immediately. Identify all DGX systems provisioned from the same base image. Regenerate and redeploy unique SSH host keys across every affected machine to prevent host impersonation and MITM attacks. This is a critical architectural flaw that needs direct remediation, not just patching.

Indicators of Compromise

IDTypeIndicator
CVE-2026-24218 Misconfiguration NVIDIA DGX OS factory provisioning process
CVE-2026-24218 Auth Bypass Identical SSH host keys deployed across multiple systems
CVE-2026-24218 RCE Host impersonation or attacker-in-the-middle attacks via shared SSH keys
CVE-2026-24218 Privilege Escalation Host impersonation or attacker-in-the-middle attacks via shared SSH keys
CVE-2026-24218 Information Disclosure Host impersonation or attacker-in-the-middle attacks via shared SSH keys
🔎
Check NVIDIA DGX OS Vulnerabilities Use /brief for a summary of high-impact vulnerabilities like this one, including remediation advice.
Open Intel Bot →
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 20, 2026 at 23:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-4811 — Cross-Site Scripting (XSS)

CVE-2026-4811 — The WPB Floating Menu & Categories for WordPress – Sticky Side Menu with Icons plugin for WordPress is vulnerable to Stored Cross-Site Scripting...

vulnerabilityCVEmedium-severitycross-site-scripting-xsscwe-79
/SCW Vulnerability Desk /MEDIUM /4.9 /⚑ 2 IOCs /⚙ 3 Sigma

CVE-2026-1881 — The Broadstreet plugin for WordPress is vulnerable to

CVE-2026-1881 — The Broadstreet plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.52.2 via the get_sponsored_meta...

vulnerabilityCVEmedium-severitycwe-639
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-9149 — Libsolv Buffer Overflow

CVE-2026-9149 — A flaw was found in libsolv. This heap buffer overflow vulnerability occurs when a victim processes a specially crafted `.solv` file containing negative...

vulnerabilityCVEmedium-severitybuffer-overflowcwe-122
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma