Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55558: n/a

0
High
VulnerabilityCVE-2025-55558cvecve-2025-55558
Published: Thu Sep 25 2025 (09/25/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to a Denial of Service (DoS).

AI-Powered Analysis

AILast updated: 10/03/2025, 00:38:04 UTC

Technical Analysis

CVE-2025-55558 is a high-severity vulnerability identified in PyTorch version 2.7.0, a widely used open-source machine learning framework. The vulnerability arises from a buffer overflow condition triggered when a PyTorch model includes a specific combination of components: torch.nn.Conv2d (a convolutional neural network layer), torch.nn.functional.hardshrink (a non-linear activation function), and a tensor operation sequence involving torch.Tensor.view followed by torch.mv(). When such a model is compiled using the Inductor compiler backend, this combination leads to improper memory handling that causes a buffer overflow. The consequence of this overflow is a Denial of Service (DoS), where the affected application or service crashes or becomes unresponsive, disrupting normal operations. The CVSS v3.1 base score of 7.5 reflects a high severity, with the vector indicating the vulnerability is remotely exploitable over the network without any required privileges or user interaction, and it impacts availability only, without compromising confidentiality or integrity. The underlying weakness is categorized under CWE-400, which relates to uncontrolled resource consumption, consistent with a DoS condition. No known exploits have been reported in the wild as of the publication date, and no patches or fixes have been linked yet. This vulnerability is significant for environments that deploy PyTorch models compiled with Inductor, especially those exposed to untrusted inputs or remote model execution requests.

Potential Impact

For European organizations, the impact of CVE-2025-55558 could be substantial, particularly for sectors relying heavily on AI and machine learning workloads, such as finance, healthcare, automotive, and research institutions. A successful exploitation leads to denial of service, causing downtime of critical AI services, which may disrupt business operations, delay data processing, or halt automated decision-making systems. This can result in financial losses, reduced productivity, and potential reputational damage. Since the vulnerability does not affect confidentiality or integrity, data breaches are unlikely; however, service unavailability can indirectly affect compliance with regulations like GDPR if service interruptions impact data processing timelines or availability commitments. Organizations using PyTorch models compiled with Inductor in cloud or edge environments are at higher risk, especially if these services are accessible over the network without authentication barriers.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately audit their AI/ML pipelines to identify any PyTorch 2.7.0 models that use the combination of torch.nn.Conv2d, torch.nn.functional.hardshrink, and tensor operations involving view and mv compiled with Inductor. 2) Temporarily disable or avoid using the Inductor compiler backend for model compilation until a patch is released. 3) Implement network-level protections such as firewalls and segmentation to restrict access to AI model serving endpoints, minimizing exposure to remote exploitation. 4) Monitor application logs and system metrics for signs of crashes or resource exhaustion indicative of attempted exploitation. 5) Engage with PyTorch community and vendors for updates and patches, and plan for rapid deployment once available. 6) Consider fallback to earlier stable PyTorch versions or alternative compilation backends if feasible. 7) Incorporate runtime protections such as container resource limits and watchdog processes to recover from unexpected crashes promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-13T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d5da079e21be37e937d080

Added to database: 9/26/2025, 12:10:47 AM

Last enriched: 10/3/2025, 12:38:04 AM

Last updated: 11/13/2025, 1:56:52 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats