Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (catonetworks.com) Critical Vulnerabilities in NVIDIA NeMo and Meta PyTorch Enable Remote Code Execution via Malicious AI Models

(catonetworks.com) Critical Vulnerabilities in NVIDIA NeMo and Meta PyTorch Enable Remote Code Execution via Malicious AI Models

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (catonetworks.com) Critical Vulnerabilities in NVIDIA NeMo and Meta PyTorch Enable Remote Code Execution via Malicious AI Models

    Critical RCE vulnerabilities in NVIDIA NeMo (CVE-2025-33236, CVSS 7.8) and Meta PyTorch expose AI model pipelines to full system compromise. Hardcoded `trust_remote_code=True` in NeMo and a heap buffer overflow bypass in PyTorch turn AI models into attack vectors.

    In brief - High-severity flaws in NVIDIA NeMo and Meta PyTorch enable RCE via malicious AI models, risking cloud credentials and production infrastructure. These vulnerabilities highlight critical gaps in AI supply chain security, even when best practices are followed.

    Technically - NVIDIA NeMo’s hardcoded `trust_remote_code=True` allows arbitrary Python execution during HuggingFace model imports. Meta PyTorch’s `weights_only=True` is bypassed via storage size mismatches, triggering heap buffer overflows. Both enable RCE, data exfiltration, and system compromise, underscoring the need for secure-by-default configurations and sandboxing.

    Source: https://www.catonetworks.com/blog/cato-ctrl-new-vulnerabilities-in-nvidia-nemo-and-meta-pytorch/

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups