Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63396: n/a

0
Low
VulnerabilityCVE-2025-63396cvecve-2025-63396
Published: Wed Nov 12 2025 (11/12/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in PyTorch v2.5 and v2.7.1. Omission of profiler.stop() can cause torch.profiler.profile (PythonTracer) to crash or hang during finalization, leading to a Denial of Service (DoS).

AI-Powered Analysis

AILast updated: 11/19/2025, 21:22:21 UTC

Technical Analysis

CVE-2025-63396 is a vulnerability identified in PyTorch versions 2.5 and 2.7.1 related to the improper handling of the profiler.stop() method within the torch.profiler.profile (PythonTracer) component. PyTorch is a widely used open-source machine learning framework, and its profiling tools help developers analyze performance metrics. The vulnerability arises when the profiler.stop() method is omitted, causing the profiling process to either crash or hang during the finalization phase. This behavior leads to a Denial of Service (DoS) condition by disrupting the availability of the profiling functionality and potentially the application using it. The issue is classified under CWE-667 (Improper Locking), indicating a concurrency or synchronization problem during profiler finalization. The CVSS score is 3.3 (low), reflecting the limited impact confined to availability without affecting confidentiality or integrity. Exploitation requires local privileges (AV:L), low attack complexity (AC:L), and no user interaction (UI:N). No known exploits have been reported in the wild, and no official patches have been released at the time of publication. This vulnerability primarily affects developers and organizations that rely on PyTorch's profiling features for performance tuning and debugging in machine learning workflows.

Potential Impact

For European organizations, the primary impact of CVE-2025-63396 is a potential Denial of Service affecting applications or services that utilize PyTorch's profiling tools. This can lead to interruptions in machine learning model development, testing, and performance analysis, potentially delaying project timelines and reducing operational efficiency. Since the vulnerability does not compromise data confidentiality or integrity, the risk is limited to availability. Organizations heavily invested in AI and ML, especially those using PyTorch for research, development, or production workloads, may experience degraded service or crashes if profiling is improperly managed. This could affect sectors such as automotive, finance, healthcare, and technology where AI workloads are prevalent. However, the requirement for local privileges to exploit the vulnerability limits the attack surface primarily to internal users or compromised systems. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.

Mitigation Recommendations

To mitigate CVE-2025-63396, organizations should ensure that all PyTorch profiling code explicitly calls profiler.stop() to properly finalize profiling sessions and avoid hangs or crashes. Developers should review and audit codebases for correct profiler lifecycle management. Incorporating automated testing to detect hangs or crashes during profiling can help identify vulnerable code paths. Monitoring application logs and performance metrics for signs of profiling failures or unexpected hangs is recommended. Until official patches are released, consider isolating profiling workloads in controlled environments to minimize impact. Additionally, restrict local access to systems running PyTorch profiling to trusted users only, reducing the risk of exploitation. Keeping PyTorch versions updated and subscribing to vendor advisories will facilitate timely application of patches once available. Educating development teams on proper profiler usage and the implications of this vulnerability will further reduce risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6914f6446c8e220c4284c5dc

Added to database: 11/12/2025, 9:04:04 PM

Last enriched: 11/19/2025, 9:22:21 PM

Last updated: 12/28/2025, 6:57:46 AM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats