VYPR
High severity8.1NVD Advisory· Published May 20, 2026

CVE-2026-24218

CVE-2026-24218

Description

NVIDIA DGX OS contains a vulnerability in the factory provisioning process, where the cloning of a base image causes identical SSH host keys to be deployed across multiple systems. The sharing of cryptographic identifiers across all similarly provisioned systems enables host impersonation or attacker-in-the-middle attacks. A successful exploit of this vulnerability might lead to code execution, data tampering, escalation of privileges, information disclosure, and denial of service.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

NVIDIA DGX OS factory cloning deploys identical SSH host keys across systems, enabling impersonation and MITM attacks.

Vulnerability

NVIDIA DGX OS contains a vulnerability in the factory provisioning process where cloning a base image results in identical SSH host keys being deployed across multiple systems [1]. This issue affects systems provisioned from the same base image, causing all such systems to share the same cryptographic identity [1].

Exploitation

An attacker with network access to a system provisioned from the cloned image can exploit the shared host keys to perform host impersonation or attacker-in-the-middle attacks [1]. No authentication is required to leverage the shared cryptographic identifiers, as the attack targets the SSH trust model itself [1].

Impact

Successful exploitation enables the attacker to impersonate a legitimate host or intercept SSH connections, potentially leading to code execution, data tampering, escalation of privileges, information disclosure, and denial of service [1]. The impact is broad due to the shared trust across multiple systems.

Mitigation

As of the publication date (2026-05-20), NVIDIA has not yet disclosed a fix or workaround in the available references [1]. Organizations should monitor NVIDIA's security advisories for a patched version of DGX OS and consider regenerating unique SSH host keys on each system as an interim measure.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.