CVE-2025-55560: n/a
An issue in pytorch v2.7.0 can lead to a Denial of Service (DoS) when a PyTorch model consists of torch.Tensor.to_sparse() and torch.Tensor.to_dense() and is compiled by Inductor.
AI Analysis
Technical Summary
CVE-2025-55560 is a vulnerability identified in PyTorch version 2.7.0, a widely used open-source machine learning framework. The issue arises when a PyTorch model utilizes the operations torch.Tensor.to_sparse() and torch.Tensor.to_dense() in conjunction with the Inductor compiler backend. Inductor is a PyTorch component designed to optimize and compile models for improved performance. The vulnerability can lead to a Denial of Service (DoS) condition, where the affected model, when compiled by Inductor and containing the specified tensor operations, may crash or become unresponsive. This DoS results from improper handling or resource management during the conversion between sparse and dense tensor formats within the compilation process. Since sparse tensors are used to efficiently represent data with many zero elements, the conversion operations are critical in certain machine learning workflows. The lack of a CVSS score and absence of known exploits in the wild indicate that this vulnerability is newly published and may not yet have been weaponized. However, the potential for disruption exists, especially in environments where PyTorch models are deployed in production and rely on these tensor operations. No patch or remediation link is currently provided, suggesting that users must monitor PyTorch updates closely for a fix. The vulnerability does not require user interaction or authentication to trigger, as it is inherent to the model compilation process itself.
Potential Impact
For European organizations, the impact of this vulnerability could be significant in sectors relying heavily on machine learning and AI workloads, such as finance, healthcare, automotive, and research institutions. A DoS condition in PyTorch models could disrupt critical AI-driven services, leading to downtime, degraded service quality, and potential loss of trust from customers or stakeholders. Organizations using PyTorch models with sparse tensor operations compiled via Inductor may experience unexpected crashes or failures, impacting automated decision-making systems, predictive analytics, or real-time data processing pipelines. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact could cascade into operational disruptions and financial losses. Additionally, organizations with strict service-level agreements (SLAs) may face compliance issues if AI services become unavailable. Given the growing adoption of AI technologies across Europe, this vulnerability underscores the need for proactive monitoring and mitigation to maintain service continuity.
Mitigation Recommendations
European organizations should immediately audit their use of PyTorch, specifically checking for version 2.7.0 and the presence of models that use torch.Tensor.to_sparse() and torch.Tensor.to_dense() operations compiled with Inductor. Until a patch is released, organizations should consider the following mitigations: 1) Avoid compiling models with Inductor if they use the affected tensor operations; instead, use alternative compilation backends or run models in interpreted mode. 2) Implement runtime monitoring to detect abnormal model crashes or performance degradation indicative of DoS conditions. 3) Isolate AI workloads in containerized or sandboxed environments to limit the impact of potential crashes on broader systems. 4) Engage with PyTorch community channels and security advisories to receive timely updates and patches. 5) Conduct thorough testing of AI models after any framework updates to ensure stability. 6) For critical deployments, consider fallback mechanisms or redundancy in AI services to maintain availability during incidents. These targeted steps go beyond generic advice by focusing on the specific operations and compilation context that trigger the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Switzerland
CVE-2025-55560: n/a
Description
An issue in pytorch v2.7.0 can lead to a Denial of Service (DoS) when a PyTorch model consists of torch.Tensor.to_sparse() and torch.Tensor.to_dense() and is compiled by Inductor.
AI-Powered Analysis
Technical Analysis
CVE-2025-55560 is a vulnerability identified in PyTorch version 2.7.0, a widely used open-source machine learning framework. The issue arises when a PyTorch model utilizes the operations torch.Tensor.to_sparse() and torch.Tensor.to_dense() in conjunction with the Inductor compiler backend. Inductor is a PyTorch component designed to optimize and compile models for improved performance. The vulnerability can lead to a Denial of Service (DoS) condition, where the affected model, when compiled by Inductor and containing the specified tensor operations, may crash or become unresponsive. This DoS results from improper handling or resource management during the conversion between sparse and dense tensor formats within the compilation process. Since sparse tensors are used to efficiently represent data with many zero elements, the conversion operations are critical in certain machine learning workflows. The lack of a CVSS score and absence of known exploits in the wild indicate that this vulnerability is newly published and may not yet have been weaponized. However, the potential for disruption exists, especially in environments where PyTorch models are deployed in production and rely on these tensor operations. No patch or remediation link is currently provided, suggesting that users must monitor PyTorch updates closely for a fix. The vulnerability does not require user interaction or authentication to trigger, as it is inherent to the model compilation process itself.
Potential Impact
For European organizations, the impact of this vulnerability could be significant in sectors relying heavily on machine learning and AI workloads, such as finance, healthcare, automotive, and research institutions. A DoS condition in PyTorch models could disrupt critical AI-driven services, leading to downtime, degraded service quality, and potential loss of trust from customers or stakeholders. Organizations using PyTorch models with sparse tensor operations compiled via Inductor may experience unexpected crashes or failures, impacting automated decision-making systems, predictive analytics, or real-time data processing pipelines. While the vulnerability does not directly compromise data confidentiality or integrity, the availability impact could cascade into operational disruptions and financial losses. Additionally, organizations with strict service-level agreements (SLAs) may face compliance issues if AI services become unavailable. Given the growing adoption of AI technologies across Europe, this vulnerability underscores the need for proactive monitoring and mitigation to maintain service continuity.
Mitigation Recommendations
European organizations should immediately audit their use of PyTorch, specifically checking for version 2.7.0 and the presence of models that use torch.Tensor.to_sparse() and torch.Tensor.to_dense() operations compiled with Inductor. Until a patch is released, organizations should consider the following mitigations: 1) Avoid compiling models with Inductor if they use the affected tensor operations; instead, use alternative compilation backends or run models in interpreted mode. 2) Implement runtime monitoring to detect abnormal model crashes or performance degradation indicative of DoS conditions. 3) Isolate AI workloads in containerized or sandboxed environments to limit the impact of potential crashes on broader systems. 4) Engage with PyTorch community channels and security advisories to receive timely updates and patches. 5) Conduct thorough testing of AI models after any framework updates to ensure stability. 6) For critical deployments, consider fallback mechanisms or redundancy in AI services to maintain availability during incidents. These targeted steps go beyond generic advice by focusing on the specific operations and compilation context that trigger the vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-08-13T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68d5682325eee97faa1f4ccc
Added to database: 9/25/2025, 4:04:51 PM
Last enriched: 9/25/2025, 4:05:28 PM
Last updated: 9/26/2025, 10:14:54 AM
Views: 10
Related Threats
CVE-2025-11060: Incorrect Authorization in Red Hat OpenShift Service Mesh 3
MediumCVE-2025-11014: Heap-based Buffer Overflow in OGRECave Ogre
MediumCVE-2025-11013: NULL Pointer Dereference in BehaviorTree
MediumCVE-2025-11012: Stack-based Buffer Overflow in BehaviorTree
MediumCVE-2025-11011: NULL Pointer Dereference in BehaviorTree
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.