Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55552: n/a

0
Medium
VulnerabilityCVE-2025-55552cvecve-2025-55552
Published: Thu Sep 25 2025 (09/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

pytorch v2.8.0 was discovered to display unexpected behavior when the components torch.rot90 and torch.randn_like are used together.

AI-Powered Analysis

AILast updated: 10/03/2025, 00:29:33 UTC

Technical Analysis

CVE-2025-55552 is a medium-severity vulnerability identified in PyTorch version 2.8.0, specifically involving the interaction between the torch.rot90 and torch.randn_like components. PyTorch is a widely used open-source machine learning framework, and these two functions serve distinct purposes: torch.rot90 rotates a tensor by 90 degrees, while torch.randn_like generates a tensor with random values having the same shape as a given tensor. The vulnerability manifests as unexpected behavior when these two functions are used together, which is categorized under CWE-682 (Incorrect Calculation). Although the exact nature of the unexpected behavior is not detailed, the CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) indicates that the vulnerability can be exploited remotely without authentication or user interaction, requires low attack complexity, and impacts availability only, with no confidentiality or integrity loss. This suggests that the vulnerability likely causes denial of service or crashes rather than data breaches or unauthorized data manipulation. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation might rely on workarounds or awaiting an official fix. The vulnerability's impact is limited to availability, but given PyTorch's widespread use in AI research, development, and production environments, any disruption could affect machine learning workflows and dependent applications.

Potential Impact

For European organizations, especially those involved in AI research, development, and deployment, this vulnerability could lead to service interruptions or denial of service in systems utilizing PyTorch 2.8.0 where torch.rot90 and torch.randn_like are used in conjunction. This could affect sectors such as automotive (autonomous driving AI), healthcare (medical imaging analysis), finance (algorithmic trading models), and academia. Disruptions could delay critical AI model training or inference tasks, impacting operational efficiency and potentially causing financial or reputational damage. However, since the vulnerability does not affect confidentiality or integrity, risks related to data breaches or manipulation are minimal. The lack of required authentication and user interaction means attackers could potentially trigger the issue remotely, increasing the risk of automated or large-scale disruption attempts. Organizations relying heavily on PyTorch for production AI workloads should consider this vulnerability seriously to maintain service availability.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement several practical mitigations: 1) Audit and review codebases to identify usage patterns involving torch.rot90 and torch.randn_like together and avoid or refactor such combinations until a patch is available. 2) Employ runtime monitoring and anomaly detection to identify crashes or availability issues linked to these functions. 3) Isolate PyTorch workloads in containerized or sandboxed environments to limit the impact of potential crashes on broader systems. 4) Maintain up-to-date backups and implement robust failover mechanisms for critical AI services to minimize downtime. 5) Engage with PyTorch community and vendors for updates and patches, and plan timely upgrades once fixes are released. 6) Consider temporary downgrades to earlier PyTorch versions if feasible and if those versions are not affected by this issue. 7) Incorporate this vulnerability into incident response plans to ensure rapid reaction if exploitation attempts are detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-13T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d5da079e21be37e937d085

Added to database: 9/26/2025, 12:10:47 AM

Last enriched: 10/3/2025, 12:29:33 AM

Last updated: 10/7/2025, 9:56:24 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats