CVE-2025-2000: CWE-502 Deserialization of Untrusted Data in IBM Qiskit SDK
A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload.
AI Analysis
Technical Summary
CVE-2025-2000 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting IBM's Qiskit SDK, specifically version 0.18.0. The vulnerability arises from the insecure deserialization process of QPY files, which are binary formats used by Qiskit to serialize quantum circuits and related data. When a Python process invokes the `qiskit.qpy.load()` function to deserialize QPY files of format versions less than 13, it may execute arbitrary Python code embedded maliciously within the payload. This occurs without requiring any privilege escalation, user interaction, or authentication, making exploitation straightforward if an attacker can supply a crafted QPY file. The vulnerability has a CVSS v3.1 score of 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Successful exploitation compromises confidentiality, integrity, and availability of the affected system by allowing arbitrary code execution within the context of the Python process using Qiskit. Although no known exploits have been reported in the wild yet, the high severity and ease of exploitation make this a significant threat, especially for environments processing untrusted QPY files. The lack of available patches at the time of publication further increases risk. This vulnerability highlights the risks inherent in deserializing untrusted data formats without proper validation or sandboxing, particularly in specialized software like quantum computing SDKs.
Potential Impact
For European organizations, the impact of this vulnerability could be substantial, especially for research institutions, universities, and companies involved in quantum computing research and development that utilize IBM's Qiskit SDK. Exploitation could lead to full system compromise of machines running vulnerable Qiskit versions, enabling attackers to execute arbitrary code, steal sensitive research data, manipulate quantum algorithms, or disrupt computational workflows. Given the criticality and the fact that no privileges or user interaction are required, attackers could remotely target systems that process QPY files received from external collaborators or third-party sources. This could undermine intellectual property protection, damage reputations, and cause operational downtime. Additionally, organizations involved in quantum software development or cloud-based quantum computing services could face supply chain risks if malicious QPY files are introduced. The vulnerability also poses risks to data confidentiality and integrity, potentially affecting compliance with European data protection regulations if sensitive data is exposed or altered.
Mitigation Recommendations
1. Immediate upgrade: Organizations should upgrade Qiskit SDK to versions 1.5.0 or later (or any version where this vulnerability is patched) as soon as a patch is released by IBM. 2. Input validation: Until patches are available, implement strict validation and integrity checks on all QPY files before deserialization. Only accept QPY files from trusted and verified sources. 3. Isolation: Run Qiskit processes that deserialize QPY files in isolated, sandboxed environments or containers with minimal privileges to limit the impact of potential code execution. 4. Monitoring: Enable detailed logging and monitoring of Qiskit usage and Python process activities to detect anomalous behavior indicative of exploitation attempts. 5. Network controls: Restrict network access to systems running vulnerable Qiskit versions, especially from untrusted networks, to reduce exposure. 6. Security awareness: Educate developers and researchers about the risks of deserializing untrusted data and encourage secure coding practices. 7. Incident response: Prepare incident response plans specifically for quantum computing environments to quickly address potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Sweden, Belgium, Italy
CVE-2025-2000: CWE-502 Deserialization of Untrusted Data in IBM Qiskit SDK
Description
A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload.
AI-Powered Analysis
Technical Analysis
CVE-2025-2000 is a critical vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting IBM's Qiskit SDK, specifically version 0.18.0. The vulnerability arises from the insecure deserialization process of QPY files, which are binary formats used by Qiskit to serialize quantum circuits and related data. When a Python process invokes the `qiskit.qpy.load()` function to deserialize QPY files of format versions less than 13, it may execute arbitrary Python code embedded maliciously within the payload. This occurs without requiring any privilege escalation, user interaction, or authentication, making exploitation straightforward if an attacker can supply a crafted QPY file. The vulnerability has a CVSS v3.1 score of 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Successful exploitation compromises confidentiality, integrity, and availability of the affected system by allowing arbitrary code execution within the context of the Python process using Qiskit. Although no known exploits have been reported in the wild yet, the high severity and ease of exploitation make this a significant threat, especially for environments processing untrusted QPY files. The lack of available patches at the time of publication further increases risk. This vulnerability highlights the risks inherent in deserializing untrusted data formats without proper validation or sandboxing, particularly in specialized software like quantum computing SDKs.
Potential Impact
For European organizations, the impact of this vulnerability could be substantial, especially for research institutions, universities, and companies involved in quantum computing research and development that utilize IBM's Qiskit SDK. Exploitation could lead to full system compromise of machines running vulnerable Qiskit versions, enabling attackers to execute arbitrary code, steal sensitive research data, manipulate quantum algorithms, or disrupt computational workflows. Given the criticality and the fact that no privileges or user interaction are required, attackers could remotely target systems that process QPY files received from external collaborators or third-party sources. This could undermine intellectual property protection, damage reputations, and cause operational downtime. Additionally, organizations involved in quantum software development or cloud-based quantum computing services could face supply chain risks if malicious QPY files are introduced. The vulnerability also poses risks to data confidentiality and integrity, potentially affecting compliance with European data protection regulations if sensitive data is exposed or altered.
Mitigation Recommendations
1. Immediate upgrade: Organizations should upgrade Qiskit SDK to versions 1.5.0 or later (or any version where this vulnerability is patched) as soon as a patch is released by IBM. 2. Input validation: Until patches are available, implement strict validation and integrity checks on all QPY files before deserialization. Only accept QPY files from trusted and verified sources. 3. Isolation: Run Qiskit processes that deserialize QPY files in isolated, sandboxed environments or containers with minimal privileges to limit the impact of potential code execution. 4. Monitoring: Enable detailed logging and monitoring of Qiskit usage and Python process activities to detect anomalous behavior indicative of exploitation attempts. 5. Network controls: Restrict network access to systems running vulnerable Qiskit versions, especially from untrusted networks, to reduce exposure. 6. Security awareness: Educate developers and researchers about the risks of deserializing untrusted data and encourage secure coding practices. 7. Incident response: Prepare incident response plans specifically for quantum computing environments to quickly address potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ibm
- Date Reserved
- 2025-03-05T16:10:36.949Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6883ae32ad5a09ad00530b6b
Added to database: 7/25/2025, 4:17:54 PM
Last enriched: 9/2/2025, 12:39:29 AM
Last updated: 9/6/2025, 6:52:04 AM
Views: 44
Related Threats
CVE-2025-10033: SQL Injection in itsourcecode Online Discussion Forum
MediumCVE-2025-10032: Cross Site Scripting in Campcodes Grocery Sales and Inventory System
MediumCVE-2025-10031: SQL Injection in Campcodes Grocery Sales and Inventory System
MediumCVE-2025-10030: SQL Injection in Campcodes Grocery Sales and Inventory System
MediumCVE-2025-10028: Cross Site Scripting in itsourcecode POS Point of Sale System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.