TorchServe is a flexible and easy-to-use tool for serving and scaling PyTorch models in production. In affected versions the two gRPC ports 7070 and 7071, are not bound to [localhost](http://localhost/) by default, so when TorchServe is launched, these two interfaces are bound to all interfaces. Customers using PyTorch inference Deep Learning Containers (DLC) through Amazon SageMaker and EKS are not affected. This issue in TorchServe has been fixed in PR #3083. TorchServe release 0.11.0 includes the fix to address this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Wed, 07 Aug 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L'}

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-07-18T22:40:06.549Z

Updated: 2024-08-07T15:59:53.795Z

Reserved: 2024-05-10T14:24:24.343Z

Link: CVE-2024-35199

cve-icon Vulnrichment

Updated: 2024-08-02T03:07:46.885Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-19T02:15:14.777

Modified: 2024-08-07T16:15:44.737

Link: CVE-2024-35199

cve-icon Redhat

No data.