#PickleScan
🚨 EUVD-2025-205782
📊 n/a

📝 Picklescan is vulnerable to RCE via missing detection when calling numpy.f2py.crackfortran.getlincoef

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205782

#cybersecurity #infosec #cve #euvd
December 30, 2025 at 4:30 PM
🚨 EUVD-2025-205781
📊 n/a

📝 Picklescan is vulnerable to RCE through missing detection when calling numpy.f2py.crackfortran._eval_length

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205781

#cybersecurity #infosec #cve #euvd
December 30, 2025 at 4:30 PM
🚨 EUVD-2025-205780
📊 n/a

📝 Picklescan is vulnerable to RCE via missing detection when calling built-in python _operator.attrgetter

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205780

#cybersecurity #infosec #cve #euvd
December 30, 2025 at 4:29 PM
🚨 EUVD-2025-205779
📊 n/a

📝 Picklescan is vulnerable to RCE via missing detection when calling built-in python _operator.methodcaller

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205779

#cybersecurity #infosec #cve #euvd
December 30, 2025 at 4:29 PM
🚨 EUVD-2025-205659
📊 n/a

📝 Picklescan is vulnerable to RCE via missing detection when calling numpy.f2py.crackfortran.param_eval

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205659

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 11:01 PM
🚨 EUVD-2025-205639
📊 n/a

📝 Picklescan is vulnerable to RCE through missing detection when calling built-in python operator.methodcaller

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205639

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 9:08 PM
🚨 EUVD-2025-205638
📊 n/a

📝 Picklescan is vulnerable to RCE through missing detection when calling numpy.f2py.crackfortran.myeval

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205638

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 9:08 PM
🚨 EUVD-2025-7445
📊 5.3/10
🏢 mmaitre314

📝 picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping s...

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-7445

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 4:04 PM
🚨 EUVD-2025-7156
📊 5.3/10
🏢 mmaitre314

📝 picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model arc...

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-7156

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 4:04 PM
🚨 EUVD-2025-5523
📊 5.3/10
🏢 mmaitre314

📝 picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious mode...

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-5523

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 4:04 PM
🚨 EUVD-2025-5323
📊 5.3/10
🏢 mmaitre314

📝 picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI...

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-5323

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 4:04 PM
🚨 EUVD-2025-205592
📊 n/a

📝 Picklescan vulnerable to Arbitrary File Writing

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205592

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 4:01 PM
🚨 EUVD-2025-205591
📊 n/a

📝 Picklescan does not block ctypes

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205591

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 4:01 PM
🚨 EUVD-2025-205590
📊 n/a

📝 Picklescan has Incomplete List of Disallowed Inputs

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205590

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 4:01 PM
🚨 EUVD-2025-205589
📊 n/a

📝 Picklescan missing detection when calling pty.spawn

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205589

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 4:01 PM
🚨 EUVD-2025-205588
📊 n/a

📝 Picklescan Bypasses Unsafe Globals Check using pty.spawn

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205588

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 4:01 PM
🚨 EUVD-2025-205587
📊 n/a

📝 Picklescan missing detection when calling numpy.f2py.crackfortran.getlincoef

🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205587

#cybersecurity #infosec #cve #euvd
December 29, 2025 at 4:01 PM
The "AI Pivot" is exhausting, but it’s the new baseline. If you’re a SOC Analyst in 2025, you’re also an AI Security Engineer.
Stay vigilant. The payload is in the weights. 🛡️
#CyberSecurity #SOCLife #BlueTeam #AISecurity #PickleScan #InfoSec2025 #MachineLearning
December 21, 2025 at 3:43 PM
🚨 SOC Note: The AI Supply Chain is officially on fire. 🚨
Forget Log4j. In Dec 2025, we’re hunting CVE-2025-23001—a.k.a. "PickleScan."
Attackers are now embedding RCE payloads inside pre-trained AI models (.pkl/.h5). If your devs download a "helper" model from a public repo, you're compromised. 🧵👇
December 21, 2025 at 3:41 PM
The latest update for #JFrog includes "CVE-2025-55182 and CVE-2025-66478 ('React2Shell') – All you need to know" and "PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities".

#cybersecurity #devops #CICD #Artifactory https://opsmtrs.com/3tbAFrI
JFrog
JFrog products seamlessly integrate with practically any development environment on Earth, from legacy code to the most recent containers and micro-services.
opsmtrs.com
December 6, 2025 at 6:19 AM
📌 Critical Vulnerabilities in Picklescan Allow Arbitrary Code Execution via Malicious PyTorch Models https://www.cyberhub.blog/article/16395-critical-vulnerabilities-in-picklescan-allow-arbitrary-code-execution-via-malicious-pytorch-models
Critical Vulnerabilities in Picklescan Allow Arbitrary Code Execution via Malicious PyTorch Models
Picklescan, an open-source tool designed to analyze Python pickle files for malicious content, has been found to contain three critical vulnerabilities. These vulnerabilities allow malicious actors to execute arbitrary code by loading untrusted PyTorch models, thereby bypassing the tool's protection mechanisms. The vulnerabilities exploit gaps in Picklescan's processing of pickle files, leading to potential remote code execution and evasion of detection mechanisms. Developed by Matthieu Maitre, Picklescan is widely used for detecting malicious content in pickle files, which are known for their potential to execute arbitrary code during deserialization. The impact of these vulnerabilities is significant, as they undermine the tool's primary function and could lead to full system compromise if exploited. While no specific disclosure or patch date has been mentioned, it is crucial for users of Picklescan to be aware of these vulnerabilities and take appropriate mitigations. Further details on the specific vulnerabilities and potential workarounds can be found in the source article. The discovery of these vulnerabilities highlights the importance of securing tools used for security purposes and the ongoing challenge of handling untrusted data. From an expert perspective, these vulnerabilities serve as a reminder of the risks associated with deserializing untrusted data. Even tools designed to mitigate these risks can themselves be vulnerable to exploitation. Therefore, it is crucial for organizations to implement multiple layers of defense, including input validation and regular security assessments. Additionally, the fact that these vulnerabilities can be exploited via malicious PyTorch models is particularly concerning given the widespread use of PyTorch in machine learning applications. In conclusion, while Picklescan is a valuable tool for detecting malicious content in pickle files, these vulnerabilities highlight the need for ongoing vigilance and security updates.
www.cyberhub.blog
December 5, 2025 at 9:20 PM
Critical 0-day vulnerabilities in PickleScan allow arbitrary code execution via malicious PyTorch models. Users must upgrade to version 0.0.31 immediately. #CyberSecurity #AI #MachineLearning Link: thedailytechfeed.com/critical-vul...
December 5, 2025 at 4:26 PM
AI Scanners Under Fire After Three Critical PickleScan Zero-Days Shake PyTorch Security

A Silent Threat Rising Inside the AI Supply Chain The security walls guarding modern machine learning systems have always begun with one foundation, the AI model scanner. These scanners were designed to sift…
AI Scanners Under Fire After Three Critical PickleScan Zero-Days Shake PyTorch Security
A Silent Threat Rising Inside the AI Supply Chain The security walls guarding modern machine learning systems have always begun with one foundation, the AI model scanner. These scanners were designed to sift through serialized model files, expose hidden threats, and block malicious actors before they reached production environments. Yet recent discoveries reveal that one of the most trusted defenses in the industry, PickleScan, contains severe blind spots.
undercodenews.com
December 5, 2025 at 6:43 AM
PickleScan Uncovers 0-Day Vulnerabilities Allowing Arbitrary Code Execution via Malicious PyTorch Models https://gbhackers.com/picklescan-0-day/
December 5, 2025 at 4:32 AM