• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
warning: pytorch models vulnerable to remote code execution via shelltorch

Warning: PyTorch Models Vulnerable to Remote Code Execution via ShellTorch

You are here: Home / General Cyber Security News / Warning: PyTorch Models Vulnerable to Remote Code Execution via ShellTorch
October 3, 2023

Cybersecurity scientists have disclosed many critical security flaws in the TorchServe instrument for serving and scaling PyTorch models that could be chained to achieve remote code execution on afflicted techniques.

Israel-based mostly runtime software security company Oligo, which produced the discovery, has coined the vulnerabilities ShellTorch.

“These vulnerabilities […] can lead to a complete chain Remote Code Execution (RCE), leaving plenty of thousands of expert services and conclude-end users — such as some of the world’s most significant organizations — open to unauthorized entry and insertion of destructive AI styles, and perhaps a whole server takeover,” security scientists Idan Levcovich, Male Kaplan, and Gal Elbaz said.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The list of flaws, which have been addressed in version .8.2, is as follows –

  • No CVE – Unauthenticated Management Interface API Misconfiguration (…)
  • CVE-2023-43654 (CVSS rating: 7.2) – A distant server-side request forgery (SSRF) that qualified prospects to distant code execution.
  • CVE-2022-1471 (CVSS rating: 9.9) – Use of an insecure version of the SnakeYAML open-supply library that enables for unsafe deserialization of Java objects

Profitable exploitation of the aforementioned flaws could allow an attacker to send a ask for to upload a destructive model from an actor-controlled address, primary to arbitrary code execution.

Put in other text, an attacker who can remotely accessibility the administration server can also upload a destructive design, which allows code execution with out requiring any authentication on any default TorchServe server.

Even far more troublingly, the shortcomings could be chained with CVE-2022-1471 to pave the way for code execution and entire takeover of uncovered circumstances.

Cybersecurity

“AI designs can include things like a YAML file to declare their desired configuration, so by uploading a design with a maliciously crafted YAML file, we had been capable to set off an unsafe deserialization attack that resulted in code execution on the machine,” the scientists explained.

The severity of the issues has prompted Amazon Web Companies (AWS) to issue an advisory urging shoppers employing PyTorch inference Deep Studying Containers (DLC) 1.13.1, 2.., or 2..1 in EC2, EKS, or ECS produced prior to September 11, 2023, update to TorchServe edition .8.2.

“Applying the privileges granted by these vulnerabilities, it is probable to perspective, modify, steal, and delete AI products and delicate knowledge flowing into and from the target TorchServe server,” the researchers claimed.

“Making these vulnerabilities even far more dangerous: when an attacker exploits the design serving server, they can obtain and change sensitive info flowing in and out from the goal TorchServe server, harming the have confidence in and trustworthiness of the application.”

Found this write-up exciting? Abide by us on Twitter  and LinkedIn to read far more unique information we publish.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «over 3 dozen data stealing malicious npm packages found targeting developers Over 3 Dozen Data-Stealing Malicious npm Packages Found Targeting Developers
Next Post: Qualcomm Releases Patch for 3 new Zero-Days Under Active Exploitation qualcomm releases patch for 3 new zero days under active exploitation»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.