Impact
LeRobot through 0.5.1 contains an unsafe deserialization vulnerability where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. This CWE‑502 weakness allows an attacker to send a crafted pickle payload via the SendPolicyInstructions, SendObservations, or GetActions gRPC calls and achieve arbitrary code execution on the server or client, thereby compromising the confidentiality, integrity, and availability of the entire system.
Affected Systems
All Hugging Face LeRobot releases up to and including version 0.5.1 are affected. Versions released after 0.5.1 are assumed to have addressed the flaw, though the specific patched version is not disclosed in the available data.
Risk and Exploitability
Based on the description, it is inferred that the primary attack vector is an unauthenticated gRPC channel without TLS. The CVSS score of 9.3 indicates critical severity. The EPSS score of < 1% suggests a low probability of exploitation at the time of analysis, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, because remote code execution is possible, the risk remains high, especially in environments where the policy server or robot client are exposed over the network.
OpenCVE Enrichment