Impact
The vulnerability exists in PyTorch 2.10.0 within the pt2 Loading Handler. An attacker can manipulate the deserialization process, potentially leading to code execution or other local impacts. The weakness aligns with input validation and unsafe deserialization classes. Attack is limited to local environments and the exploit is publicly available, as indicated by the project’s early notification. The described impact is moderate but could allow an attacker with local access to compromise the system.
Affected Systems
PyTorch version 2.10.0 is affected. The vendor is PyTorch. The issue is confined to the pt2 Loading Handler component. Any installation of this version that loads or deserializes data through this handler is vulnerable. There is no further version detail provided; newer releases may be unaffected.
Risk and Exploitability
The CVSS score of 4.8 indicates a moderate severity. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is local, requiring an attacker with access to the host; however, the publicly available exploit demonstrates that a local attacker could leverage the deserialization flaw. While the risk is limited to the local environment, the potential for arbitrary code execution within that context warrants prompt attention.
OpenCVE Enrichment