CVE-2025-46148: n/a
In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results.
AI Analysis
Technical Summary
CVE-2025-46148 is a vulnerability identified in the PyTorch machine learning framework, specifically affecting versions up to 2.6.0 when operating in eager execution mode. The issue arises in the nn.PairwiseDistance module when configured with p=2 (Euclidean distance), where it produces incorrect results. This vulnerability is not related to a traditional security breach such as code execution or information disclosure but rather to the integrity and correctness of computational outputs. Since PyTorch is widely used for developing and deploying machine learning models, especially in research and production environments, incorrect distance calculations can lead to flawed model behavior, erroneous analytics, and potentially compromised decision-making processes that rely on these models. The vulnerability does not have an assigned CVSS score, no known exploits in the wild, and no patches or fixes currently published. The lack of a CVSS score and exploit information suggests this is primarily a correctness bug rather than a direct security exploit. However, the impact on data integrity and model reliability can be significant in sensitive applications.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on their reliance on PyTorch-based machine learning models, particularly those using the nn.PairwiseDistance function with p=2 in eager mode. Industries such as finance, healthcare, automotive, and critical infrastructure that utilize AI for decision-making, anomaly detection, or predictive analytics could experience degraded model accuracy, leading to incorrect predictions or classifications. This could result in financial losses, misdiagnosis, or safety risks. Moreover, organizations involved in AI research or deploying AI services might face reputational damage if flawed models are released or used in production. Since the vulnerability affects the integrity of computations rather than confidentiality or availability, the direct cybersecurity risk is moderate. However, the indirect risk through compromised model trustworthiness and decision-making processes is notable. The absence of known exploits reduces immediate threat urgency but does not eliminate the risk of future exploitation or cascading effects in AI-dependent systems.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if their PyTorch installations are at or below version 2.6.0 and if their code uses nn.PairwiseDistance with p=2 in eager mode. They should conduct thorough testing and validation of model outputs involving this function to detect anomalies or inconsistencies. Until an official patch is released, consider the following specific actions: 1) Avoid using nn.PairwiseDistance(p=2) in eager mode; instead, use alternative distance metrics or implement custom distance calculations validated for correctness. 2) If feasible, switch to PyTorch’s graph mode or other execution modes where this issue does not manifest. 3) Engage with the PyTorch community or maintainers to track patch releases and apply updates promptly once available. 4) Implement additional model validation layers or cross-checks to ensure output integrity, especially in critical applications. 5) Document and communicate this limitation internally to data scientists and engineers to prevent inadvertent use. These targeted mitigations go beyond generic advice by focusing on the specific function and execution mode implicated.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-46148: n/a
Description
In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results.
AI-Powered Analysis
Technical Analysis
CVE-2025-46148 is a vulnerability identified in the PyTorch machine learning framework, specifically affecting versions up to 2.6.0 when operating in eager execution mode. The issue arises in the nn.PairwiseDistance module when configured with p=2 (Euclidean distance), where it produces incorrect results. This vulnerability is not related to a traditional security breach such as code execution or information disclosure but rather to the integrity and correctness of computational outputs. Since PyTorch is widely used for developing and deploying machine learning models, especially in research and production environments, incorrect distance calculations can lead to flawed model behavior, erroneous analytics, and potentially compromised decision-making processes that rely on these models. The vulnerability does not have an assigned CVSS score, no known exploits in the wild, and no patches or fixes currently published. The lack of a CVSS score and exploit information suggests this is primarily a correctness bug rather than a direct security exploit. However, the impact on data integrity and model reliability can be significant in sensitive applications.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on their reliance on PyTorch-based machine learning models, particularly those using the nn.PairwiseDistance function with p=2 in eager mode. Industries such as finance, healthcare, automotive, and critical infrastructure that utilize AI for decision-making, anomaly detection, or predictive analytics could experience degraded model accuracy, leading to incorrect predictions or classifications. This could result in financial losses, misdiagnosis, or safety risks. Moreover, organizations involved in AI research or deploying AI services might face reputational damage if flawed models are released or used in production. Since the vulnerability affects the integrity of computations rather than confidentiality or availability, the direct cybersecurity risk is moderate. However, the indirect risk through compromised model trustworthiness and decision-making processes is notable. The absence of known exploits reduces immediate threat urgency but does not eliminate the risk of future exploitation or cascading effects in AI-dependent systems.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if their PyTorch installations are at or below version 2.6.0 and if their code uses nn.PairwiseDistance with p=2 in eager mode. They should conduct thorough testing and validation of model outputs involving this function to detect anomalies or inconsistencies. Until an official patch is released, consider the following specific actions: 1) Avoid using nn.PairwiseDistance(p=2) in eager mode; instead, use alternative distance metrics or implement custom distance calculations validated for correctness. 2) If feasible, switch to PyTorch’s graph mode or other execution modes where this issue does not manifest. 3) Engage with the PyTorch community or maintainers to track patch releases and apply updates promptly once available. 4) Implement additional model validation layers or cross-checks to ensure output integrity, especially in critical applications. 5) Document and communicate this limitation internally to data scientists and engineers to prevent inadvertent use. These targeted mitigations go beyond generic advice by focusing on the specific function and execution mode implicated.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68d5511823f14e593ee33392
Added to database: 9/25/2025, 2:26:32 PM
Last enriched: 9/25/2025, 2:28:22 PM
Last updated: 10/7/2025, 1:41:15 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Hackers Stole Data From Public Safety Comms Firm BK Technologies
MediumCVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.