picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain undetected by PickleScan while still being successfully loaded by PyTorch's torch.load(). This can lead to arbitrary code execution when loading a compromised model.
History

Wed, 19 Mar 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Mmaitre314
Mmaitre314 picklescan
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:*
Vendors & Products Mmaitre314
Mmaitre314 picklescan
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 10 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 10 Mar 2025 12:00:00 +0000

Type Values Removed Values Added
Description picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain undetected by PickleScan while still being successfully loaded by PyTorch's torch.load(). This can lead to arbitrary code execution when loading a compromised model.
Title picklescan - Zip Flag Bit Exploit Crashes Picklescan But Not PyTorch
Weaknesses CWE-345
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Sonatype

Published:

Updated: 2025-03-10T12:05:04.004Z

Reserved: 2025-03-04T12:59:35.306Z

Link: CVE-2025-1945

cve-icon Vulnrichment

Updated: 2025-03-10T12:04:55.756Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-10T12:15:12.450

Modified: 2025-03-19T16:14:37.237

Link: CVE-2025-1945

cve-icon Redhat

No data.