
Cloud Vulnerability DB
A community-led vulnerabilities database
NVFLARE (NVIDIA Federated Learning Application Runtime Environment), in versions prior to 2.1.2, contains a critical vulnerability in its utils module. The vulnerability was discovered by Oliver Sellwood and assigned CVE-2022-31605. The issue was disclosed on June 21, 2022, involving unsafe YAML deserialization where YAML files are loaded using yaml.load() instead of the secure yaml.safe_load() method (GitHub Advisory).
The vulnerability is classified as CWE-502 (Deserialization of Untrusted Data) and received a Critical CVSS score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The technical issue stems from the improper implementation of YAML file loading in the utils module, where the unsafe yaml.load() function is used instead of the recommended yaml.safe_load() method (GitHub Advisory).
The vulnerability can allow an unprivileged network attacker to execute remote code, cause denial of service conditions, and impact both the confidentiality and integrity of the affected systems. The high severity score indicates the potential for significant system compromise without requiring special privileges or user interaction (GitHub Advisory).
NVIDIA has released version 2.1.2 of NVFLARE which includes a patch for this vulnerability. As a workaround, users can modify their code to replace yaml.load() with yaml.safe_load(). It is strongly recommended to upgrade to the patched version 2.1.2 or implement the suggested workaround (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."