Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

Backlash over OpenAI’s decision to deprecate GPT-4o shows how dangerous AI companions can be

CISA orders removal of unsupported edge devices to reduce risk to federal networks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Picklescan bug could allow malicious PyTorch models to bypass scanning and execute code
Identity

Picklescan bug could allow malicious PyTorch models to bypass scanning and execute code

userBy userDecember 3, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 3, 2025Ravi LakshmananMachine learning/vulnerabilities

Three serious security flaws have been revealed in an open source utility called Picklescan. This flaw could allow a malicious attacker to load an untrusted PyTorch model and execute arbitrary code, effectively bypassing the tool’s protections.

Picklescan, developed and maintained by Matthieu Maitre (@mmaitre314), is a security scanner designed to parse Python pickle files and detect suspicious imports and function calls before they are executed. Pickle is a serialization format widely used in machine learning, including PyTorch, which uses this format to save and load models.

However, pickle files can be a major security risk because they can be used to automatically trigger the execution of arbitrary Python code when loaded. This requires users and organizations to load trusted models or load model weights from TensorFlow and Flax.

The issue discovered by JFrog essentially bypasses the scanner and marks scanned model files as safe, allowing malicious code to run and potentially paving the way for supply chain attacks.

cyber security

“Each of the vulnerabilities discovered could allow attackers to evade PickleScan’s malware detection and conduct large-scale supply chain attacks by distributing malicious ML models that hide undetectable malicious code,” said security researcher David Cohen.

At its core, Picklescan works by inspecting pickle files at the bytecode level and matching the results against a blocklist of known dangerous imports and operations to flag similar behavior. This approach, as opposed to allowlisting, prevents tools from detecting new attack vectors and also means that developers must consider all possible malicious behavior.

The defects identified are:

CVE-2025-10155 (CVSS Score: 9.3/7.8) – File extension bypass vulnerability used to weaken scanners and load models when serving standard pickle files with PyTorch-related extensions such as .bin or .pt CVE-2025-10156 (CVSS Score: 9.3/7.5) – Bypass vulnerability that can be used to disable ZIP archive scanning by introducing Cyclic Redundancy Check (CRC) error CVE-2025-10157 (CVSS score: 9.3/8.3) – A bypass vulnerability that can be used to weaken Picklescan’s insecure global checks. Arbitrary code can be executed by bypassing the blocklist of dangerous imports.

Successful exploitation of the aforementioned flaws could allow an attacker to hide malicious pickle payloads within files using common PyTorch extensions, intentionally introduce CRC errors to ZIP archives containing malicious models, or create malicious PyTorch models with embedded pickle payloads to bypass scanners.

Following responsible disclosure on June 29, 2025, the three vulnerabilities were addressed in Picklescan version 0.0.31, released on September 9.

This development comes as SecDim and DCODX detail another high-severity security flaw (CVE-2025-46417, CVSS score: 7.5/7.1) in the same utility. This flaw could be exploited by a malicious pickle file to bypass the tool’s blocklist and leak sensitive information via DNS when loading a model.

In a hypothetical attack scenario, an attacker could reuse legitimate Python modules such as linecache and ssl to read sensitive data from files such as ‘/etc/passwd’ using ‘linecache.getline()’ and send that data to a domain under their control using ‘ssl.get_server_certificate()’.

cyber security

“The leaked content is recorded in the DNS logs. When we scan this payload with Picklescan 0.0.24, it returns ‘No issues found’ because line cache and SSL were not on the deny list,” SecDim said.

The findings point to several important systemic issues, including dependence on a single scanning tool and differences in file handling behavior between security tools and PyTorch, making the security architecture vulnerable to attacks.

“AI libraries like PyTorch are becoming more complex by the day, with new features, model formats, and execution paths being introduced faster than security scanning tools can adapt,” Cohen said. “The growing gap between innovation and protection exposes organizations to new threats that traditional tools cannot predict.”

“Bridging this gap requires a research-backed, AI-modeled security proxy continuously informed by experts who think like both attackers and defenders. By proactively analyzing new models, tracking library updates, and uncovering new exploitation techniques, this approach delivers adaptive, intelligence-driven protection against the most important vulnerabilities.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMalicious Rust Crate delivers OS-specific malware to Web3 developer systems
Next Article Turn disruptive technologies into strategic advantages
user
  • Website

Related Posts

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026

CISA orders removal of unsupported edge devices to reduce risk to federal networks

February 6, 2026

Asian State Assistance Group TGR-STA-1030 breaches 70 governments and infrastructure-related organizations

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

Backlash over OpenAI’s decision to deprecate GPT-4o shows how dangerous AI companions can be

CISA orders removal of unsupported edge devices to reduce risk to federal networks

Combat antimicrobial resistance with McGill rapid tests

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.