Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-28500

Опубликовано: 18 мар. 2026
Источник: debian
EPSS Низкий

Описание

Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is designed to warn users when loading models from non-official sources, the use of the silent=True parameter completely suppresses all security warnings and confirmation prompts. This vulnerability transforms a standard model-loading function into a vector for Zero-Interaction Supply-Chain Attacks. When chained with file-system vulnerabilities, an attacker can silently exfiltrate sensitive files (SSH keys, cloud credentials) from the victim's machine the moment the model is loaded. As of time of publication, no known patched versions are available.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
onnxunfixedpackage
onnxno-dsatrixiepackage
onnxno-dsabookwormpackage

Примечания

  • https://github.com/onnx/onnx/security/advisories/GHSA-hqmj-h5c6-369m

EPSS

Процентиль: 1%
0.0001
Низкий

Связанные уязвимости

CVSS3: 8.6
ubuntu
10 дней назад

(Open Neural Network Exchange (ONNX) is an open standard for machine le ...)

CVSS3: 8.6
redhat
10 дней назад

A flaw was found in Open Neural Network Exchange (ONNX), an open standard for machine learning interoperability. A security control bypass exists in the `onnx.hub.load()` function due to improper logic in its repository trust verification. An attacker can exploit this by providing a malicious model, which, when loaded with the `silent=True` parameter, suppresses all security warnings. This vulnerability transforms a standard model-loading function into a vector for Zero-Interaction Supply-Chain Attacks.

CVSS3: 8.6
nvd
10 дней назад

Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is designed to warn users when loading models from non-official sources, the use of the silent=True parameter completely suppresses all security warnings and confirmation prompts. This vulnerability transforms a standard model-loading function into a vector for Zero-Interaction Supply-Chain Attacks. When chained with file-system vulnerabilities, an attacker can silently exfiltrate sensitive files (SSH keys, cloud credentials) from the victim's machine the moment the model is loaded. As of time of publication, no known patched versions are available.

CVSS3: 8.6
github
11 дней назад

ONNX Untrusted Model Repository Warnings Suppressed by silent=True in onnx.hub.load() — Silent Supply-Chain Attack

EPSS

Процентиль: 1%
0.0001
Низкий