Логотип exploitDog
bind:CVE-2025-32444
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-32444

Количество 4

Количество 4

redhat логотип

CVE-2025-32444

5 месяцев назад

vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.6.5 and prior to 0.8.5, having vLLM integration with mooncake, are vulnerable to remote code execution due to using pickle based serialization over unsecured ZeroMQ sockets. The vulnerable sockets were set to listen on all network interfaces, increasing the likelihood that an attacker is able to reach the vulnerable ZeroMQ sockets to carry out an attack. vLLM instances that do not make use of the mooncake integration are not vulnerable. This issue has been patched in version 0.8.5.

CVSS3: 10
EPSS: Низкий
nvd логотип

CVE-2025-32444

5 месяцев назад

vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.6.5 and prior to 0.8.5, having vLLM integration with mooncake, are vulnerable to remote code execution due to using pickle based serialization over unsecured ZeroMQ sockets. The vulnerable sockets were set to listen on all network interfaces, increasing the likelihood that an attacker is able to reach the vulnerable ZeroMQ sockets to carry out an attack. vLLM instances that do not make use of the mooncake integration are not vulnerable. This issue has been patched in version 0.8.5.

CVSS3: 10
EPSS: Низкий
debian логотип

CVE-2025-32444

5 месяцев назад

vLLM is a high-throughput and memory-efficient inference and serving e ...

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-hj4w-hm2g-p6w5

5 месяцев назад

vLLM Vulnerable to Remote Code Execution via Mooncake Integration

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-32444

vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.6.5 and prior to 0.8.5, having vLLM integration with mooncake, are vulnerable to remote code execution due to using pickle based serialization over unsecured ZeroMQ sockets. The vulnerable sockets were set to listen on all network interfaces, increasing the likelihood that an attacker is able to reach the vulnerable ZeroMQ sockets to carry out an attack. vLLM instances that do not make use of the mooncake integration are not vulnerable. This issue has been patched in version 0.8.5.

CVSS3: 10
1%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-32444

vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.6.5 and prior to 0.8.5, having vLLM integration with mooncake, are vulnerable to remote code execution due to using pickle based serialization over unsecured ZeroMQ sockets. The vulnerable sockets were set to listen on all network interfaces, increasing the likelihood that an attacker is able to reach the vulnerable ZeroMQ sockets to carry out an attack. vLLM instances that do not make use of the mooncake integration are not vulnerable. This issue has been patched in version 0.8.5.

CVSS3: 10
1%
Низкий
5 месяцев назад
debian логотип
CVE-2025-32444

vLLM is a high-throughput and memory-efficient inference and serving e ...

CVSS3: 10
1%
Низкий
5 месяцев назад
github логотип
GHSA-hj4w-hm2g-p6w5

vLLM Vulnerable to Remote Code Execution via Mooncake Integration

CVSS3: 10
1%
Низкий
5 месяцев назад

Уязвимостей на страницу