CVE-2025-2953: Denial of Service in PyTorch
A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0+cu124. Affected by this issue is the function torch.mkldnn_max_pool2d. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The security policy of the project warns to use unknown models which might establish malicious effects.
AI Analysis
Technical Summary
CVE-2025-2953 is a denial of service (DoS) vulnerability identified in the PyTorch machine learning framework, specifically affecting version 2.6.0+cu124. The vulnerability resides in the function torch.mkldnn_max_pool2d, which is part of PyTorch's implementation of max pooling operations optimized with Intel's MKL-DNN (oneDNN) backend. The flaw allows an attacker with local access to trigger a denial of service condition by manipulating inputs to this function, causing the application or service running PyTorch to crash or become unresponsive. Exploitation requires local access, meaning the attacker must have the ability to execute code or commands on the affected system. The vulnerability has been publicly disclosed, but there is some uncertainty regarding its practical existence or exploitability, as noted by the original report. No patches or fixes have been published at this time, and no known exploits are currently observed in the wild. The PyTorch project security policy also warns users to exercise caution when using unknown or untrusted models, as these could potentially trigger malicious effects, possibly related to this or other vulnerabilities. Overall, this vulnerability highlights a risk in the handling of specific tensor operations within PyTorch's MKL-DNN optimized layers that could be leveraged to disrupt service availability on affected systems.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns availability disruptions in environments running PyTorch 2.6.0+cu124, especially those utilizing the MKL-DNN backend for performance optimization. Organizations relying on PyTorch for AI model training, inference, or deployment in research, finance, healthcare, or industrial automation could face service interruptions if an attacker gains local access and triggers the DoS condition. Although the attack requires local access, the risk is elevated in multi-tenant environments such as shared research clusters, cloud-based AI platforms, or enterprise servers where multiple users have execution privileges. Disruptions could delay critical AI workloads, impact business operations, or degrade service quality. The lack of a patch and the public disclosure increase the risk of future exploitation attempts. However, the uncertainty about the vulnerability's practical exploitability and the absence of known exploits somewhat mitigate immediate risk. Confidentiality and integrity impacts appear minimal, as the vulnerability specifically causes denial of service rather than data leakage or corruption.
Mitigation Recommendations
Given the local access requirement and the specific function affected, European organizations should implement the following targeted mitigations: 1) Restrict local execution privileges to trusted users only, minimizing the risk of malicious local code execution. 2) Avoid running untrusted or unknown PyTorch models, especially those sourced externally, to reduce the chance of triggering the vulnerability. 3) Monitor and audit usage of PyTorch environments, particularly focusing on the invocation of MKL-DNN optimized functions like mkldnn_max_pool2d. 4) Employ containerization or sandboxing techniques to isolate PyTorch workloads, limiting the blast radius of potential DoS attacks. 5) Maintain up-to-date backups and implement robust service restart and recovery procedures to minimize downtime if a DoS occurs. 6) Engage with PyTorch community and security advisories to track the release of patches or updates addressing this vulnerability. 7) Consider temporarily disabling MKL-DNN acceleration if feasible, or using alternative backends until a fix is available, to avoid triggering the vulnerable code path.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Switzerland, Belgium
CVE-2025-2953: Denial of Service in PyTorch
Description
A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0+cu124. Affected by this issue is the function torch.mkldnn_max_pool2d. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The security policy of the project warns to use unknown models which might establish malicious effects.
AI-Powered Analysis
Technical Analysis
CVE-2025-2953 is a denial of service (DoS) vulnerability identified in the PyTorch machine learning framework, specifically affecting version 2.6.0+cu124. The vulnerability resides in the function torch.mkldnn_max_pool2d, which is part of PyTorch's implementation of max pooling operations optimized with Intel's MKL-DNN (oneDNN) backend. The flaw allows an attacker with local access to trigger a denial of service condition by manipulating inputs to this function, causing the application or service running PyTorch to crash or become unresponsive. Exploitation requires local access, meaning the attacker must have the ability to execute code or commands on the affected system. The vulnerability has been publicly disclosed, but there is some uncertainty regarding its practical existence or exploitability, as noted by the original report. No patches or fixes have been published at this time, and no known exploits are currently observed in the wild. The PyTorch project security policy also warns users to exercise caution when using unknown or untrusted models, as these could potentially trigger malicious effects, possibly related to this or other vulnerabilities. Overall, this vulnerability highlights a risk in the handling of specific tensor operations within PyTorch's MKL-DNN optimized layers that could be leveraged to disrupt service availability on affected systems.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns availability disruptions in environments running PyTorch 2.6.0+cu124, especially those utilizing the MKL-DNN backend for performance optimization. Organizations relying on PyTorch for AI model training, inference, or deployment in research, finance, healthcare, or industrial automation could face service interruptions if an attacker gains local access and triggers the DoS condition. Although the attack requires local access, the risk is elevated in multi-tenant environments such as shared research clusters, cloud-based AI platforms, or enterprise servers where multiple users have execution privileges. Disruptions could delay critical AI workloads, impact business operations, or degrade service quality. The lack of a patch and the public disclosure increase the risk of future exploitation attempts. However, the uncertainty about the vulnerability's practical exploitability and the absence of known exploits somewhat mitigate immediate risk. Confidentiality and integrity impacts appear minimal, as the vulnerability specifically causes denial of service rather than data leakage or corruption.
Mitigation Recommendations
Given the local access requirement and the specific function affected, European organizations should implement the following targeted mitigations: 1) Restrict local execution privileges to trusted users only, minimizing the risk of malicious local code execution. 2) Avoid running untrusted or unknown PyTorch models, especially those sourced externally, to reduce the chance of triggering the vulnerability. 3) Monitor and audit usage of PyTorch environments, particularly focusing on the invocation of MKL-DNN optimized functions like mkldnn_max_pool2d. 4) Employ containerization or sandboxing techniques to isolate PyTorch workloads, limiting the blast radius of potential DoS attacks. 5) Maintain up-to-date backups and implement robust service restart and recovery procedures to minimize downtime if a DoS occurs. 6) Engage with PyTorch community and security advisories to track the release of patches or updates addressing this vulnerability. 7) Consider temporarily disabling MKL-DNN acceleration if feasible, or using alternative backends until a fix is available, to avoid triggering the vulnerable code path.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-03-29T19:35:04.653Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf775e
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 4:52:07 PM
Last updated: 8/18/2025, 11:34:07 PM
Views: 18
Related Threats
CVE-2025-43753: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-51606: n/a
CriticalCVE-2025-43747: CWE-918 Server-Side Request Forgery (SSRF) in Liferay DXP
MediumCVE-2025-27714: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumCVE-2025-24489: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.