Impact
The vulnerability affects Python's profiling.sampling module and asyncio introspection tools, allowing a malicious or infected Python process to perform out-of-bounds read and write operations in a privileged target process that connects via the remote debugging feature. This can lead to leakage of sensitive memory or modification of memory contents, potentially compromising confidentiality or integrity of the privileged process.
Affected Systems
Python CPython 3.15+ for the profiling.sampling module and Python CPython 3.14+ for asyncio introspection commands (python -m asyncio ps and python -m asyncio pstree).
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. Because the exploit requires a persistent remote debugging connection to a privileged process, the attack vector is likely remote or local with privileged access. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog, so no known active exploitation is documented. The need for repeated connections and the high likelihood of crashing due to ASLR suggests that while exploitation is possible, it may require significant effort and expertise.
OpenCVE Enrichment