Skip to main content

CVE-2025-30405: Integer Overflow or Wraparound (CWE-190) in Meta Platforms, Inc ExecuTorch

Critical
VulnerabilityCVE-2025-30405cvecve-2025-30405cwe-190
Published: Thu Aug 07 2025 (08/07/2025, 22:55:40 UTC)
Source: CVE Database V5
Vendor/Project: Meta Platforms, Inc
Product: ExecuTorch

Description

An integer overflow vulnerability in the loading of ExecuTorch models can cause objects to be placed outside their allocated memory area, potentially resulting in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 0830af8207240df8d7f35b984cdf8bc35d74fa73.

AI-Powered Analysis

AILast updated: 08/15/2025, 01:04:05 UTC

Technical Analysis

CVE-2025-30405 is a critical integer overflow vulnerability (CWE-190) identified in Meta Platforms, Inc's ExecuTorch product. ExecuTorch is a framework or library used for loading and executing machine learning models. The vulnerability arises during the loading process of ExecuTorch models, where an integer overflow or wraparound can occur. This overflow leads to incorrect calculations of memory allocation sizes, causing objects to be placed outside their intended memory boundaries. Such memory corruption can result in arbitrary code execution, allowing an attacker to execute malicious code with the privileges of the ExecuTorch process. The vulnerability affects all versions of ExecuTorch prior to the commit 0830af8207240df8d7f35b984cdf8bc35d74fa73, indicating that a patch or fix has been committed but not yet widely released or deployed. The CVSS v3.1 base score is 9.8, reflecting the vulnerability's critical severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, but the potential for exploitation is high given the nature of the vulnerability and its ease of exploitation. This vulnerability could be exploited remotely without authentication or user interaction, making it a significant risk for any organization using ExecuTorch for machine learning workloads.

Potential Impact

For European organizations, the impact of CVE-2025-30405 could be severe. Organizations leveraging ExecuTorch in their AI/ML pipelines, especially those processing sensitive or critical data, face risks of unauthorized code execution, data breaches, and service disruptions. The ability to execute arbitrary code remotely without authentication means attackers could gain control over systems running ExecuTorch, potentially leading to lateral movement within networks, data exfiltration, or sabotage of AI models and outputs. This could affect sectors such as finance, healthcare, telecommunications, and critical infrastructure, where AI models are increasingly integrated. Additionally, compromised AI models could lead to erroneous decision-making or manipulation of automated processes, amplifying operational risks. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the critical severity score necessitates urgent attention to prevent exploitation.

Mitigation Recommendations

1. Immediate application of the patch or update containing commit 0830af8207240df8d7f35b984cdf8bc35d74fa73 once it is officially released by Meta Platforms. 2. Until patches are available, restrict network access to ExecuTorch services to trusted internal networks only, employing network segmentation and firewall rules to minimize exposure. 3. Implement runtime application self-protection (RASP) or memory protection mechanisms such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to mitigate exploitation impact. 4. Conduct thorough code audits and fuzz testing on ExecuTorch model loading routines to detect similar integer overflow issues proactively. 5. Monitor logs and network traffic for anomalous behavior indicative of exploitation attempts, including unexpected process executions or memory access violations. 6. Employ strict input validation and sanitization on model files before loading to prevent malformed or malicious models from triggering the overflow. 7. Develop incident response plans specific to AI/ML infrastructure compromise scenarios to enable rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
facebook
Date Reserved
2025-03-21T19:52:56.086Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68953094ad5a09ad00fdbe50

Added to database: 8/7/2025, 11:02:44 PM

Last enriched: 8/15/2025, 1:04:05 AM

Last updated: 8/30/2025, 3:07:57 PM

Views: 35

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats