ACON is a widely-used library of tools for machine learning that focuses on adaptive correlation optimization. A potential vulnerability has been identified in the input validation process, which could lead to arbitrary code execution if exploited. This issue could allow an attacker to submit malicious input data, bypassing input validation, resulting in remote code execution in certain machine learning applications using the ACON library. All users utilizing ACON’s input-handling functions are potentially at risk. Specifically, machine learning models or applications that ingest user-generated data without proper sanitization are the most vulnerable. Users running ACON on production servers are at heightened risk, as the vulnerability could be exploited remotely. As of time of publication, it is unclear whether a fix is available.
Metrics
Affected Vendors & Products
References
History
Fri, 18 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Acon
Acon acon |
|
CPEs | cpe:2.3:a:acon:acon:*:*:*:*:*:*:*:* | |
Vendors & Products |
Acon
Acon acon |
|
Metrics |
ssvc
|
Fri, 18 Oct 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | ACON is a widely-used library of tools for machine learning that focuses on adaptive correlation optimization. A potential vulnerability has been identified in the input validation process, which could lead to arbitrary code execution if exploited. This issue could allow an attacker to submit malicious input data, bypassing input validation, resulting in remote code execution in certain machine learning applications using the ACON library. All users utilizing ACON’s input-handling functions are potentially at risk. Specifically, machine learning models or applications that ingest user-generated data without proper sanitization are the most vulnerable. Users running ACON on production servers are at heightened risk, as the vulnerability could be exploited remotely. As of time of publication, it is unclear whether a fix is available. | |
Title | Potential Vulnerability in ACON Library: Improper Input Validation Leading to Malicious Code Execution | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-10-18T18:55:42.604Z
Updated: 2024-10-18T20:41:16.532Z
Reserved: 2024-10-14T13:56:34.810Z
Link: CVE-2024-49361
Vulnrichment
Updated: 2024-10-18T20:40:58.626Z
NVD
Status : Awaiting Analysis
Published: 2024-10-18T19:15:14.393
Modified: 2024-10-21T17:10:22.857
Link: CVE-2024-49361
Redhat
No data.