Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-1669

Опубликовано: 11 фев. 2026
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 through 3.13.1 on all supported platforms allows a remote attacker to read local files and disclose sensitive information via a crafted .keras model file utilizing HDF5 external dataset references.

A flaw was found in Keras. A remote attacker can exploit an arbitrary file read vulnerability in the model loading mechanism (HDF5 integration) by providing a specially crafted .keras model file that utilizes HDF5 external dataset references. This allows the attacker to read local files and disclose sensitive information.

Отчет

This IMPORTANT flaw in Keras allows for arbitrary file read operations. Red Hat OpenShift AI is impacted, as the vulnerability resides in the model loading mechanism when processing crafted .keras model files that leverage HDF5 external dataset references. This could lead to sensitive information disclosure on affected systems.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift AI (RHOAI)rhoai/odh-kserve-agent-rhel9Fix deferred
Red Hat OpenShift AI (RHOAI)rhoai/odh-kserve-controller-rhel9Fix deferred
Red Hat OpenShift AI (RHOAI)rhoai/odh-kserve-router-rhel9Fix deferred
Red Hat OpenShift AI (RHOAI)rhoai/odh-kserve-storage-initializer-rhel9Fix deferred
Red Hat OpenShift AI (RHOAI)rhoai/odh-modelmesh-runtime-adapter-rhel8Fix deferred
Red Hat OpenShift AI (RHOAI)rhoai/odh-modelmesh-runtime-adapter-rhel9Fix deferred
Red Hat OpenShift AI (RHOAI)rhoai/odh-pipeline-runtime-tensorflow-cuda-py312-rhel9Fix deferred
Red Hat OpenShift AI (RHOAI)rhoai/odh-pipeline-runtime-tensorflow-rocm-py312-rhel9Fix deferred
Red Hat OpenShift AI (RHOAI)rhoai/odh-workbench-jupyter-tensorflow-cuda-py312-rhel9Fix deferred
Red Hat OpenShift AI (RHOAI)rhoai/odh-workbench-jupyter-tensorflow-rocm-py312-rhel9Fix deferred

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-73
https://bugzilla.redhat.com/show_bug.cgi?id=2439205keras: Keras: Information disclosure via arbitrary file read in model loading mechanism

EPSS

Процентиль: 2%
0.00014
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 2 месяцев назад

Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 through 3.13.1 on all supported platforms allows a remote attacker to read local files and disclose sensitive information via a crafted .keras model file utilizing HDF5 external dataset references.

CVSS3: 7.5
nvd
около 2 месяцев назад

Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 through 3.13.1 on all supported platforms allows a remote attacker to read local files and disclose sensitive information via a crafted .keras model file utilizing HDF5 external dataset references.

CVSS3: 7.5
debian
около 2 месяцев назад

Arbitrary file read in the model loading mechanism (HDF5 integration) ...

CVSS3: 7.1
github
около 1 месяца назад

Keras has a Local File Disclosure via HDF5 External Storage During Keras Weight Loading

EPSS

Процентиль: 2%
0.00014
Низкий

6.5 Medium

CVSS3