12 C
Washington
Saturday, April 19, 2025

Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks

Must read

Cybersecurity researchers have disclosed a number of safety flaws impacting open-source machine studying (ML) instruments and frameworks equivalent to MLflow, H2O, PyTorch, and MLeap that would pave the way in which for code execution.

The vulnerabilities, found by JFrog, are a part of a broader assortment of twenty-two safety shortcomings the provision chain safety firm first disclosed final month.

In contrast to the primary set that concerned flaws on the server-side, the newly detailed ones permit exploitation of ML shoppers and reside in libraries that deal with secure mannequin codecs like Safetensors.

“Hijacking an ML consumer in a corporation can permit the attackers to carry out intensive lateral motion inside the group,” the corporate mentioned. “An ML consumer could be very more likely to have entry to essential ML providers equivalent to ML Mannequin Registries or MLOps Pipelines.”

This, in flip, might expose delicate info equivalent to mannequin registry credentials, successfully allowing a malicious actor to backdoor saved ML fashions or obtain code execution.

The checklist of vulnerabilities is beneath –

  • CVE-2024-27132 (CVSS rating: 7.2) – An inadequate sanitization situation in MLflow that results in a cross-site scripting (XSS) assault when working an untrusted recipe in a Jupyter Pocket book, in the end leading to client-side distant code execution (RCE)
  • CVE-2024-6960 (CVSS rating: 7.5) – An unsafe deserialization situation in H20 when importing an untrusted ML mannequin, doubtlessly leading to RCE
  • A path traversal situation in PyTorch’s TorchScript function that would lead to denial-of-service (DoS) or code execution attributable to arbitrary file overwrite, which might then be used to overwrite crucial system recordsdata or a official pickle file (No CVE identifier)
  • CVE-2023-5245 (CVSS rating: 7.5) – A path traversal situation in MLeap when loading a saved mannequin in zipped format can result in a Zip Slip vulnerability, leading to arbitrary file overwrite and potential code execution
See also  Metroid Prime 4: Beyond Pre-Orders on Amazon Are Reportedly Being Cancelled

JFrog famous that ML fashions should not be blindly loaded even in instances the place they’re loaded from a secure kind, equivalent to Safetensors, as they’ve the aptitude to attain arbitrary code execution.

“AI and Machine Studying (ML) instruments maintain immense potential for innovation, however also can open the door for attackers to trigger widespread injury to any group,” Shachar Menashe, JFrog’s VP of Safety Analysis, mentioned in an announcement.

“To safeguard in opposition to these threats, it is essential to know which fashions you are utilizing and by no means load untrusted ML fashions even from a ‘secure’ ML repository. Doing so can result in distant code execution in some situations, inflicting intensive hurt to your group.”

Related News

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News