Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Critical Vulnerabilities in Picklescan: A Cybersecurity Alert

Автор: Infosec Now

Загружено: 2025-12-25

Просмотров: 2

Описание:

In this video, we dive into the recently disclosed vulnerabilities in the open-source utility, Picklescan, which have the potential to allow malicious actors to execute arbitrary code through untrusted PyTorch models. These critical flaws were revealed on December 3, 2025, and they highlight significant risks associated with the serialization format used in machine learning.

*What you’ll learn:* We will explore the nature of these vulnerabilities, the timeline of their discovery, and the implications for organizations using machine learning models. Additionally, we will provide actionable recommendations on how to safeguard against these threats.

Picklescan, developed by Matthieu Maitre, is designed to parse Python pickle files and detect suspicious imports or function calls before execution. However, the recent findings by JFrog reveal that three critical security flaws could enable attackers to bypass these protections. The vulnerabilities are as follows:

1. **CVE-2025-10155**: A file extension bypass vulnerability that can undermine the scanner by allowing the loading of models with standard PyTorch-related extensions like .bin or .pt.
2. **CVE-2025-10156**: A bypass vulnerability that disables ZIP archive scanning through a Cyclic Redundancy Check (CRC) error.
3. **CVE-2025-10157**: A vulnerability that undermines the unsafe globals check, allowing arbitrary code execution by circumventing the blocklist of dangerous imports.

The exploitation of these flaws could lead to large-scale supply chain attacks, where malicious machine learning models are distributed, concealing undetectable harmful code. Security researcher David Cohen emphasizes that these vulnerabilities could facilitate significant breaches, allowing attackers to execute malicious payloads hidden within legitimate-looking files.

Following the responsible disclosure of these vulnerabilities on June 29, 2025, Picklescan released version 0.0.31 on September 9, addressing the identified issues. However, this incident raises broader concerns about the reliance on single scanning tools and the discrepancies in file-handling behaviors between security tools and frameworks like PyTorch.

Organizations must take proactive measures to mitigate these risks. This includes ensuring that only trusted models are loaded, regularly updating security tools, and adopting a multi-layered security approach that can adapt to the rapid evolution of AI technologies. As the landscape of machine learning continues to grow more complex, the gap between innovation and security protection widens, leaving many organizations vulnerable to emerging threats.

In conclusion, the vulnerabilities found in Picklescan serve as a critical reminder of the importance of robust security measures in the rapidly evolving field of machine learning. By staying informed and vigilant, organizations can better protect themselves against potential cyber threats.

Critical Vulnerabilities in Picklescan: A Cybersecurity Alert

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

React HACKED — первоначальный обзор и краткое описание инцидента

React HACKED — первоначальный обзор и краткое описание инцидента

Fortinet's New CVE-2025-58034 Vulnerability: What You Need to Know

Fortinet's New CVE-2025-58034 Vulnerability: What You Need to Know

Все говорят об этом эксплойте React

Все говорят об этом эксплойте React

EdgeStepper: New Cyber Threat Reroutes DNS for Malware Deployment

EdgeStepper: New Cyber Threat Reroutes DNS for Malware Deployment

Утечка видео с камер Flock — это как Netflix для сталкеров.

Утечка видео с камер Flock — это как Netflix для сталкеров.

Is Dark Matter Gravity Itself? The Strange Quest for the Graviton

Is Dark Matter Gravity Itself? The Strange Quest for the Graviton

Understanding Identity Security Fabric: The Future of Cybersecurity

Understanding Identity Security Fabric: The Future of Cybersecurity

ESP32 + MLX90640: тепловизор с искусственным интеллектом (TensorFlow Lite)

ESP32 + MLX90640: тепловизор с искусственным интеллектом (TensorFlow Lite)

The Physicist Who Puts Penrose’s Quantum Ideas To The Test | Ivette Fuentes

The Physicist Who Puts Penrose’s Quantum Ideas To The Test | Ivette Fuentes

The Scariest React Bug Yet (React2Shell Explained)

The Scariest React Bug Yet (React2Shell Explained)

Quantum Mechanics Is Faster Than Light

Quantum Mechanics Is Faster Than Light

Tuoni C2 Cyber Attack on Real Estate: What You Need to Know

Tuoni C2 Cyber Attack on Real Estate: What You Need to Know

Super Facts about 6-7 - Numberphile

Super Facts about 6-7 - Numberphile

Что делать, если вас взломали: полное руководство

Что делать, если вас взломали: полное руководство

Уязвимость Next.js и React приведет к поломке Интернета

Уязвимость Next.js и React приведет к поломке Интернета

AI Tools Revolutionizing Cybercrime: What You Need to Know

AI Tools Revolutionizing Cybercrime: What You Need to Know

Чат ПГТ 5.2 - это похоронная. Самый УЖАСНЫЙ релиз в истории ИИ

Чат ПГТ 5.2 - это похоронная. Самый УЖАСНЫЙ релиз в истории ИИ

Как ЗАРАБОТАТЬ на ЧУЖОЙ квартире? | амоБлог

Как ЗАРАБОТАТЬ на ЧУЖОЙ квартире? | амоБлог

New Python-Based WhatsApp Worm Spreads Eternidade Stealer in Brazil

New Python-Based WhatsApp Worm Spreads Eternidade Stealer in Brazil

Sneaky 2FA Phishing Kit: The New Threat to Your Online Security

Sneaky 2FA Phishing Kit: The New Threat to Your Online Security

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]