Vulnerability DatabaseGHSA-4mqg-h5jf-j9m7

GHSA-4mqg-h5jf-j9m7
TorchServe vulnerability analysis and mitigation

Overview

TorchServe versions 0.3.0 to 0.8.1 contain a critical pre-authentication Remote Code Execution (RCE) vulnerability identified as GHSA-4mqg-h5jf-j9m7. The vulnerability stems from the use of SnakeYAML v1.31 library, which contains multiple issues that expose users to unsafe deserialization of Java objects. This vulnerability was discovered and disclosed by Oligo Security to PyTorch maintainers Amazon and Meta (GitHub Advisory).

Technical details

The vulnerability exists due to insecure use of the SnakeYAML library when parsing YAML configuration files in TorchServe. The issue occurs when TorchServe insecurely loads user input data using the default Constructor instead of SafeConstructor, which is the recommended procedure when parsing YAML files from untrusted sources. The vulnerability has a CVSS score of 10.0 (Critical) with attack vector being Network, attack complexity Low, and requiring Low privileges with No user interaction (Oligo Security).

Impact

This vulnerability could allow third parties to execute arbitrary code on the target system. The impact affects thousands of exposed TorchServe instances used by major organizations, including Fortune 500 companies and national governments. The vulnerability impacts several major platforms and services including AWS Neuron, Kubeflow, Kserve, MLflow, AnimatedDrawings, vertex-ai-samples, and mmdetection (Oligo Security).

Mitigation and workarounds

The vulnerability has been patched in TorchServe version 0.8.2. Users are advised to upgrade to this version immediately. For users of AWS Deep Learning Containers (DLC), new image tags are available with the patched TorchServe version, including specific tags for x86 GPU, x86 CPU, Graviton, and Neuron architectures (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related TorchServe vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-4mqg-h5jf-j9m7CRITICAL9.9
  • TorchServeTorchServe
  • torchserve
NoYesOct 02, 2023
CVE-2024-35198CRITICAL9.8
  • TorchServeTorchServe
  • torchserve
NoYesJul 19, 2024
CVE-2024-35199HIGH8.2
  • TorchServeTorchServe
  • torchserve
NoYesJul 19, 2024
CVE-2024-6577MEDIUM6.3
  • TorchServeTorchServe
  • torchserve
NoNoMar 20, 2025
CVE-2023-48299MEDIUM5.3
  • TorchServeTorchServe
  • torchserve
NoYesNov 21, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management