Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55554: n/a

0
Medium
VulnerabilityCVE-2025-55554cvecve-2025-55554
Published: Thu Sep 25 2025 (09/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

pytorch v2.8.0 was discovered to contain an integer overflow in the component torch.nan_to_num-.long().

AI-Powered Analysis

AILast updated: 10/03/2025, 00:37:40 UTC

Technical Analysis

CVE-2025-55554 is a medium-severity vulnerability identified in PyTorch version 2.8.0, specifically within the torch.nan_to_num-.long() component. The issue is an integer overflow (CWE-190), which occurs when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around. This vulnerability could potentially lead to unexpected behavior or denial of service conditions. According to the CVSS v3.1 vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L), the flaw is remotely exploitable over the network without requiring any privileges or user interaction, but it only impacts availability, not confidentiality or integrity. The lack of known exploits in the wild and absence of patches at the time of publication indicate that the vulnerability is newly discovered and may not yet be actively targeted. The affected versions are not explicitly listed beyond PyTorch 2.8.0, so it is assumed that this version is vulnerable. The integer overflow in a core PyTorch function could cause application crashes or denial of service in systems relying on this library for machine learning or data processing tasks.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on their use of PyTorch 2.8.0 in production or research environments. Organizations in sectors such as finance, healthcare, automotive, and telecommunications that utilize PyTorch for AI model development or deployment could experience service disruptions if this vulnerability is exploited. While the vulnerability does not compromise data confidentiality or integrity, denial of service could interrupt critical AI-driven services or workflows, causing operational downtime and potential financial losses. Research institutions and companies relying on cloud-based AI services that incorporate PyTorch may also face availability issues. Given that the vulnerability is remotely exploitable without authentication or user interaction, attackers could potentially disrupt services at scale if they identify vulnerable endpoints exposed to the internet or within internal networks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first inventory their environments to identify any deployments of PyTorch version 2.8.0. Since no official patches are currently available, organizations should consider temporarily disabling or isolating systems running the vulnerable version from untrusted networks to reduce exposure. Applying strict network segmentation and firewall rules to limit access to AI model serving endpoints can help prevent remote exploitation. Monitoring for unusual application crashes or service interruptions related to PyTorch processes is recommended to detect potential exploitation attempts. Organizations should also follow PyTorch project communications closely for forthcoming patches or updates addressing this issue and plan prompt deployment once available. Additionally, reviewing and testing alternative versions of PyTorch or rolling back to a prior stable version without this vulnerability may be prudent until a fix is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-13T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d5da079e21be37e937d08e

Added to database: 9/26/2025, 12:10:47 AM

Last enriched: 10/3/2025, 12:37:40 AM

Last updated: 11/11/2025, 11:31:42 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats