

Affected Environment
NVIDIA FLARE SDK on Linux and macOS, and NVIDIA NemoClaw on all supported platforms are affected. All FLARE SDK versions before 2.7.2 and NemoClaw versions before 0.0.18 and 0.0.13 require review.
Threat Overview
FLARE SDK vulnerabilities allow code execution, privilege escalation, information disclosure, data tampering, and denial of service. NemoClaw vulnerabilities expose environment variables and enable SSRF, leading to information disclosure.
Exposure Timeline
Vulnerabilities and fixed versions were published by NVIDIA and summarised in this alert dated 30 April 2026. There are currently no reports of exploitation in the wild, and VPR scores are not yet available.
Attack Surface
Exposure exists where FLARE SDK is deployed with NVFlare Dashboard, FOBS, or components handling filesystem paths. NemoClaw deployments that process untrusted prompts or use external endpoint URLs expand the reachable attack surface.
Technical Root Cause
FLARE issues arise from authorization bypass, deserialization of untrusted data, and improper input validation in path handling. NemoClaw issues stem from improper access control in sandbox initialization and incomplete SSRF protection for certain IP ranges.
Exploitation Pathway
An attacker may exploit FLARE by abusing user-controlled keys, sending malicious FOBS messages, or performing path traversal. NemoClaw can be abused using prompt-injected content or crafted endpoint URLs in configuration files or CLI flags.
Operational Impact
If exploited, FLARE issues may allow attackers to run arbitrary code, escalate privileges, tamper data, or disrupt services.
NemoClaw exploitation may expose sensitive environment variables or internal resources accessed via forged requests.
Strategic Impact
Unpatched systems increase risk of compromise in environments relying on NVIDIA AI and federated learning tooling.
Data exposure, privilege abuse, and service disruption can affect trust in AI workloads and supporting infrastructure.
Required Mitigation
Upgrade FLARE SDK on Linux and macOS to version 2.7.2 or later as provided by NVIDIA.
Upgrade NemoClaw to at least v0.0.18 and v0.0.13 as applicable, and keep related software and OS components updated.
Incident Response Guidance
Identify and inventory all FLARE SDK and NemoClaw deployments, then validate versions against fixed releases.
If vulnerable versions are found, prioritise patching, review access controls, and monitor for unusual data access or requests.
Trusted by clients worldwide






Led by human expertise and powered by the VisionX platform, we provide you with a 24/7 unbeatable Managed Detection & Response capability giving you transparent and consolidated security solutions.




