CVE-2025-3162: Deserialization in InternLM LMDeploy
A vulnerability was found in InternLM LMDeploy up to 0.7.1. It has been classified as critical. Affected is the function load_weight_ckpt of the file lmdeploy/lmdeploy/vl/model/utils.py of the component PT File Handler. The manipulation leads to deserialization. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-3162 is a deserialization vulnerability identified in the InternLM LMDeploy product, specifically affecting versions 0.7.0 and 0.7.1. The vulnerability resides in the load_weight_ckpt function within the PT File Handler component, located in the lmdeploy/lmdeploy/vl/model/utils.py file. This function is responsible for loading model checkpoint weights, and improper input validation allows an attacker to manipulate the deserialization process. Deserialization vulnerabilities occur when untrusted data is used to reconstruct objects, potentially enabling attackers to execute arbitrary code or cause denial of service by injecting malicious payloads during the deserialization process. However, exploitation of this vulnerability requires local access to the system, meaning an attacker must have the ability to execute code or commands on the target machine prior to exploiting the flaw. The vulnerability has been publicly disclosed, but no known exploits are currently observed in the wild. The severity is classified as medium by the source, but the criticality of deserialization flaws generally depends on the context of exploitation and access requirements. Given that local access is mandatory, the attack surface is limited compared to remote vulnerabilities. The vulnerability affects the PT File Handler component, which is integral to loading model weights, a core function in LMDeploy’s machine learning deployment framework. Successful exploitation could lead to arbitrary code execution or system compromise, impacting the confidentiality, integrity, and availability of the affected system. Since LMDeploy is a tool used for deploying language models, organizations utilizing this software for AI workloads may face risks of unauthorized code execution or tampering with model data if local attackers exploit this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-3162 depends largely on their adoption of InternLM LMDeploy for AI model deployment. Organizations in sectors such as technology, research, finance, and critical infrastructure that leverage LMDeploy for managing language models could face risks of local privilege escalation or code execution if an attacker gains local access. This could lead to unauthorized manipulation of AI models, data leakage, or disruption of AI services. Given that exploitation requires local access, the threat is more pronounced in environments with weak internal access controls or where attackers can gain footholds through other means (e.g., phishing, insider threats). The vulnerability could also be leveraged as a pivot point for lateral movement within networks. The potential compromise of AI model integrity could have downstream effects on decision-making processes, automated systems, and data privacy compliance, which are critical concerns under European regulations such as GDPR. Additionally, disruption or manipulation of AI services could impact operational continuity in sectors increasingly reliant on AI-driven automation and analytics.
Mitigation Recommendations
To mitigate CVE-2025-3162, European organizations should: 1) Immediately upgrade LMDeploy to a patched version once available, or apply vendor-provided workarounds if patches are not yet released. 2) Restrict local access to systems running LMDeploy by enforcing strict access controls, including multi-factor authentication and role-based access control to minimize the risk of unauthorized local exploitation. 3) Monitor and audit local user activities on LMDeploy hosts to detect suspicious behavior indicative of exploitation attempts. 4) Employ application whitelisting and endpoint protection solutions to prevent execution of unauthorized code on systems running LMDeploy. 5) Isolate LMDeploy environments within secure network segments to limit lateral movement opportunities in case of compromise. 6) Conduct regular security training for administrators and users with local access to LMDeploy systems to raise awareness of social engineering and insider threats. 7) Review and harden the configuration of LMDeploy deployments, disabling unnecessary features or services that could increase attack surface. 8) Implement integrity verification mechanisms for model checkpoint files to detect tampering attempts before loading. These targeted measures go beyond generic advice by focusing on controlling local access, monitoring, and securing the specific environment where the vulnerability exists.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Switzerland
CVE-2025-3162: Deserialization in InternLM LMDeploy
Description
A vulnerability was found in InternLM LMDeploy up to 0.7.1. It has been classified as critical. Affected is the function load_weight_ckpt of the file lmdeploy/lmdeploy/vl/model/utils.py of the component PT File Handler. The manipulation leads to deserialization. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-3162 is a deserialization vulnerability identified in the InternLM LMDeploy product, specifically affecting versions 0.7.0 and 0.7.1. The vulnerability resides in the load_weight_ckpt function within the PT File Handler component, located in the lmdeploy/lmdeploy/vl/model/utils.py file. This function is responsible for loading model checkpoint weights, and improper input validation allows an attacker to manipulate the deserialization process. Deserialization vulnerabilities occur when untrusted data is used to reconstruct objects, potentially enabling attackers to execute arbitrary code or cause denial of service by injecting malicious payloads during the deserialization process. However, exploitation of this vulnerability requires local access to the system, meaning an attacker must have the ability to execute code or commands on the target machine prior to exploiting the flaw. The vulnerability has been publicly disclosed, but no known exploits are currently observed in the wild. The severity is classified as medium by the source, but the criticality of deserialization flaws generally depends on the context of exploitation and access requirements. Given that local access is mandatory, the attack surface is limited compared to remote vulnerabilities. The vulnerability affects the PT File Handler component, which is integral to loading model weights, a core function in LMDeploy’s machine learning deployment framework. Successful exploitation could lead to arbitrary code execution or system compromise, impacting the confidentiality, integrity, and availability of the affected system. Since LMDeploy is a tool used for deploying language models, organizations utilizing this software for AI workloads may face risks of unauthorized code execution or tampering with model data if local attackers exploit this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-3162 depends largely on their adoption of InternLM LMDeploy for AI model deployment. Organizations in sectors such as technology, research, finance, and critical infrastructure that leverage LMDeploy for managing language models could face risks of local privilege escalation or code execution if an attacker gains local access. This could lead to unauthorized manipulation of AI models, data leakage, or disruption of AI services. Given that exploitation requires local access, the threat is more pronounced in environments with weak internal access controls or where attackers can gain footholds through other means (e.g., phishing, insider threats). The vulnerability could also be leveraged as a pivot point for lateral movement within networks. The potential compromise of AI model integrity could have downstream effects on decision-making processes, automated systems, and data privacy compliance, which are critical concerns under European regulations such as GDPR. Additionally, disruption or manipulation of AI services could impact operational continuity in sectors increasingly reliant on AI-driven automation and analytics.
Mitigation Recommendations
To mitigate CVE-2025-3162, European organizations should: 1) Immediately upgrade LMDeploy to a patched version once available, or apply vendor-provided workarounds if patches are not yet released. 2) Restrict local access to systems running LMDeploy by enforcing strict access controls, including multi-factor authentication and role-based access control to minimize the risk of unauthorized local exploitation. 3) Monitor and audit local user activities on LMDeploy hosts to detect suspicious behavior indicative of exploitation attempts. 4) Employ application whitelisting and endpoint protection solutions to prevent execution of unauthorized code on systems running LMDeploy. 5) Isolate LMDeploy environments within secure network segments to limit lateral movement opportunities in case of compromise. 6) Conduct regular security training for administrators and users with local access to LMDeploy systems to raise awareness of social engineering and insider threats. 7) Review and harden the configuration of LMDeploy deployments, disabling unnecessary features or services that could increase attack surface. 8) Implement integrity verification mechanisms for model checkpoint files to detect tampering attempts before loading. These targeted measures go beyond generic advice by focusing on controlling local access, monitoring, and securing the specific environment where the vulnerability exists.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-03T07:06:34.195Z
- Cisa Enriched
- true
Threat ID: 682d984bc4522896dcbf84b5
Added to database: 5/21/2025, 9:09:31 AM
Last enriched: 6/20/2025, 9:35:27 AM
Last updated: 8/16/2025, 3:54:33 AM
Views: 29
Related Threats
CVE-2025-57699: Unquoted search path or element in Western Digital Corporation Western Digital Kitfox for Windows
MediumCVE-2025-8281: CWE-79 Cross-Site Scripting (XSS) in WP Talroo
HighCVE-2025-41452: CWE-15: External Control of System or Configuration Setting in Danfoss AK-SM8xxA Series
MediumCVE-2025-41451: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Danfoss AK-SM8xxA Series
HighCVE-2025-43752: CWE-770 Allocation of Resources Without Limits or Throttling in Liferay Portal
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.