Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55551: n/a

0
High
VulnerabilityCVE-2025-55551cvecve-2025-55551
Published: Thu Sep 25 2025 (09/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation.

AI-Powered Analysis

AILast updated: 10/03/2025, 00:29:21 UTC

Technical Analysis

CVE-2025-55551 is a high-severity vulnerability identified in the PyTorch machine learning framework, specifically within the torch.linalg.lu component in version 2.8.0. The vulnerability arises during a slice operation in this component, which can be exploited by an attacker to trigger a Denial of Service (DoS) condition. The underlying weakness corresponds to CWE-400, indicating an uncontrolled resource consumption issue. This means that by crafting specific inputs or requests that invoke the slice operation in torch.linalg.lu, an attacker can cause excessive resource usage, leading to application or system unavailability. The vulnerability does not require any authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the ease of exploitation (low attack complexity), no privileges required, and the impact limited to availability (no confidentiality or integrity impact). There are no known exploits in the wild at the time of publication, and no patches or mitigations have been officially released yet. Given PyTorch's widespread use in AI/ML workloads, especially in research, enterprise AI applications, and cloud services, this vulnerability poses a risk to systems running vulnerable PyTorch versions, particularly where untrusted data or inputs are processed.

Potential Impact

For European organizations, the impact of CVE-2025-55551 can be significant, especially for those relying on PyTorch 2.8.0 in production AI/ML environments. A successful DoS attack could disrupt critical AI services, including data analysis, predictive modeling, and automated decision-making systems. This disruption could lead to operational downtime, loss of productivity, and potential financial losses. Organizations in sectors such as finance, healthcare, automotive, and telecommunications, which increasingly integrate AI models into their workflows, may face service interruptions or degraded performance. Additionally, cloud service providers hosting AI workloads for European clients could experience cascading effects impacting multiple customers. Although the vulnerability does not compromise data confidentiality or integrity, availability impacts can still undermine trust and compliance with service-level agreements (SLAs) and regulatory requirements like the EU's NIS Directive. The absence of known exploits reduces immediate risk, but the public disclosure necessitates proactive measures to prevent potential future attacks.

Mitigation Recommendations

Given the lack of an official patch at the time of disclosure, European organizations should implement several practical mitigations: 1) Restrict exposure of PyTorch-based services to untrusted networks and inputs by enforcing strict network segmentation and input validation to minimize attack surface. 2) Monitor resource utilization closely on systems running PyTorch 2.8.0, setting thresholds and alerts for abnormal CPU, memory, or process usage that could indicate exploitation attempts. 3) Employ runtime application self-protection (RASP) or behavior-based anomaly detection tools to identify and block suspicious slice operations or resource-intensive calls within the torch.linalg.lu component. 4) Where feasible, isolate AI workloads in containerized or virtualized environments with resource limits (CPU, memory) to contain potential DoS effects. 5) Engage with PyTorch maintainers and community for updates or patches and plan for timely upgrades once fixes are available. 6) Conduct internal code reviews and testing to identify if custom code or third-party libraries invoke vulnerable slice operations and refactor or sandbox these calls. These targeted mitigations go beyond generic advice by focusing on operational controls and monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-13T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d558e1bbd73d20e5f40824

Added to database: 9/25/2025, 2:59:45 PM

Last enriched: 10/3/2025, 12:29:21 AM

Last updated: 11/8/2025, 12:14:36 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats