NVIDIA DGX OS: Critical SSH Key Vulnerability Exposes Systems
The National Vulnerability Database has disclosed CVE-2026-24218, a high-severity vulnerability affecting NVIDIA DGX OS. The issue stems from the factory provisioning process, where cloning a base image leads to identical SSH host keys being deployed across multiple systems. This severe misconfiguration, categorized as CWE-321 (Improperly Implemented Cryptographic Algorithm), undermines the fundamental security of SSH.
This shared cryptographic identifier allows for host impersonation and man-in-the-middle attacks. An attacker leveraging this vulnerability could achieve significant impact, including code execution, data tampering, escalation of privileges, information disclosure, and denial of service. The CVSS score of 8.1 (High) reflects the critical nature, with a vector indicating network exploitability and high impact on confidentiality, integrity, and availability.
For organizations running NVIDIA DGX OS, this isn’t a hypothetical threat. It means that every system provisioned from that same base image is cryptographically indistinguishable from the attacker’s perspective, making network-level attacks significantly easier to execute. This vulnerability essentially provides a backdoor for attackers to seamlessly blend in and control affected DGX systems.
What This Means For You
- If your organization uses NVIDIA DGX OS, you MUST address CVE-2026-24218 immediately. Identify all DGX systems provisioned from the same base image. Regenerate and redeploy unique SSH host keys across every affected machine to prevent host impersonation and MITM attacks. This is a critical architectural flaw that needs direct remediation, not just patching.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-24218 | Misconfiguration | NVIDIA DGX OS factory provisioning process |
| CVE-2026-24218 | Auth Bypass | Identical SSH host keys deployed across multiple systems |
| CVE-2026-24218 | RCE | Host impersonation or attacker-in-the-middle attacks via shared SSH keys |
| CVE-2026-24218 | Privilege Escalation | Host impersonation or attacker-in-the-middle attacks via shared SSH keys |
| CVE-2026-24218 | Information Disclosure | Host impersonation or attacker-in-the-middle attacks via shared SSH keys |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 20, 2026 at 23:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.