Executive Summary
Summary | |
---|---|
Title | Multiple deserialization vulnerabilities in PyTorch Lightning 2.4.0 and earlier versions |
Informations | |||
---|---|---|---|
Name | VU#252619 | First vendor Publication | 2025-04-03 |
Vendor | VU-CERT | Last vendor Modification | 2025-04-03 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
OverviewPyTorch Lightning versions 2.4.0 and earlier do not use any verification mechanisms to ensure that model files are safe to load before loading them. Users of PyTorch Lightning should use caution when loading models from unknown or unmanaged sources. DescriptionPyTorch Lightning, a high-level framework built on top of PyTorch, is designed to streamline deep learning model training, scaling, and deployment. PyTorch Lightning is widely used in AI research and production environments, often integrating with various cloud and distributed computing platforms to manage large-scale machine learning workloads. PyTorch Lightning contains multiple vulnerabilities related to the deserialization of untrusted data (CWE-502). These vulnerabilities arise from the unsafe use of Kasimir Schulz of HiddenLayer identified and reported the following five vulnerabilities:
ImpactA user could unknowingly load a malicious file from local or remote locations containing embedded code that executes within the system?s context, potentially leading to full system compromise. SolutionTo reduce the risk of deserialization-based vulnerabilities in PyTorch Lightning, users and organizations can implement the following mitigations at the system and operational levels:
We have not received a statement from Lightning AI at this time. Please check the Vendor Information section for updates as they become available. AcknowledgementsThanks to the reporter, Kasimir Schulz [kschulz@hiddenlayer.com] from HiddenLayer. Thanks to Matt Churilla for verifying the vulnerabilities. This document was written by Renae Metcalf, Vijay Sarvepalli, and Eric Hatleback. |
Original Source
Url : https://kb.cert.org/vuls/id/252619 |
Alert History
Date | Informations |
---|---|
2025-05-26 21:20:25 |
|