Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-1550

Опубликовано: 11 мар. 2025
Источник: redhat
CVSS3: 8.2
EPSS Низкий

Описание

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

A flaw was found in Keras. This vulnerability allows arbitrary code execution via a maliciously crafted .keras archive that manipulates the config.json file to load and execute arbitrary Python modules and functions, even with safe_mode=True.

Отчет

None of the Red Hat Products and Services are impacted by this vulnerability.

Меры по смягчению последствий

In order to reduce the success of the attack and mitigate this flaw, it is recommended to implement strict input validation for the .keras archives, restrict models to load only trusted sources and restrict privileges for model loading processes.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-api-server-v2-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-driver-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-launcher-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-persistenceagent-v2-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-ml-pipelines-scheduledworkflow-v2-rhel8Not affected
Red Hat OpenShift AI (RHOAI)rhoai/odh-modelmesh-runtime-adapter-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2351304keras: Arbitrary Code Execution via Crafted Keras Config for Model Loading

EPSS

Процентиль: 91%
0.07385
Низкий

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
8 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 9.8
nvd
8 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading.

CVSS3: 9.8
msrc
4 месяца назад

Arbitrary Code Execution via Crafted Keras Config for Model Loading

CVSS3: 9.8
debian
8 месяцев назад

The Keras Model.load_model function permits arbitrary code execution, ...

github
8 месяцев назад

Arbitrary Code Execution via Crafted Keras Config for Model Loading

EPSS

Процентиль: 91%
0.07385
Низкий

8.2 High

CVSS3