ARIA assesses this as CRITICAL due to the potential for unauthorized access or operations within isolated environments. The real-world exploitability is high given the detailed steps provided, and no patches are mentioned.
NVIDIA's NemoClaw sandbox isolation can be bypassed to run a fully local AI agent on RTX 5090. Attack vector involves modifying iptables within the sandbox environment. This could lead to unauthorized access or operations within isolated environments, affecting any user relying on NemoClaw for secure AI agent execution.
Affected Systems
- NVIDIA NemoClaw sandbox
- WSL2 with RTX 5090
Affected Versions: All versions using OpenShell (k3s + Landlock + seccomp) as of GTC launch
Remediation
- Update iptables rules to deny traffic from Docker bridge to vLLM port 8000.
- Remove custom Python relay if present in the Pod's main namespace.
- Ensure sandbox iptables are locked down and prevent
nsenterusage for rule injection.
Stack Impact
NVIDIA NemoClaw OpenShell (k3s + Landlock + seccomp)