Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46148: n/a

0
Medium
VulnerabilityCVE-2025-46148cvecve-2025-46148
Published: Thu Sep 25 2025 (09/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results.

AI-Powered Analysis

AILast updated: 09/25/2025, 14:28:22 UTC

Technical Analysis

CVE-2025-46148 is a vulnerability identified in the PyTorch machine learning framework, specifically affecting versions up to 2.6.0 when operating in eager execution mode. The issue arises in the nn.PairwiseDistance module when configured with p=2 (Euclidean distance), where it produces incorrect results. This vulnerability is not related to a traditional security breach such as code execution or information disclosure but rather to the integrity and correctness of computational outputs. Since PyTorch is widely used for developing and deploying machine learning models, especially in research and production environments, incorrect distance calculations can lead to flawed model behavior, erroneous analytics, and potentially compromised decision-making processes that rely on these models. The vulnerability does not have an assigned CVSS score, no known exploits in the wild, and no patches or fixes currently published. The lack of a CVSS score and exploit information suggests this is primarily a correctness bug rather than a direct security exploit. However, the impact on data integrity and model reliability can be significant in sensitive applications.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on their reliance on PyTorch-based machine learning models, particularly those using the nn.PairwiseDistance function with p=2 in eager mode. Industries such as finance, healthcare, automotive, and critical infrastructure that utilize AI for decision-making, anomaly detection, or predictive analytics could experience degraded model accuracy, leading to incorrect predictions or classifications. This could result in financial losses, misdiagnosis, or safety risks. Moreover, organizations involved in AI research or deploying AI services might face reputational damage if flawed models are released or used in production. Since the vulnerability affects the integrity of computations rather than confidentiality or availability, the direct cybersecurity risk is moderate. However, the indirect risk through compromised model trustworthiness and decision-making processes is notable. The absence of known exploits reduces immediate threat urgency but does not eliminate the risk of future exploitation or cascading effects in AI-dependent systems.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if their PyTorch installations are at or below version 2.6.0 and if their code uses nn.PairwiseDistance with p=2 in eager mode. They should conduct thorough testing and validation of model outputs involving this function to detect anomalies or inconsistencies. Until an official patch is released, consider the following specific actions: 1) Avoid using nn.PairwiseDistance(p=2) in eager mode; instead, use alternative distance metrics or implement custom distance calculations validated for correctness. 2) If feasible, switch to PyTorch’s graph mode or other execution modes where this issue does not manifest. 3) Engage with the PyTorch community or maintainers to track patch releases and apply updates promptly once available. 4) Implement additional model validation layers or cross-checks to ensure output integrity, especially in critical applications. 5) Document and communicate this limitation internally to data scientists and engineers to prevent inadvertent use. These targeted mitigations go beyond generic advice by focusing on the specific function and execution mode implicated.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d5511823f14e593ee33392

Added to database: 9/25/2025, 2:26:32 PM

Last enriched: 9/25/2025, 2:28:22 PM

Last updated: 10/7/2025, 1:41:15 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats