Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Data Exposure Vulnerability Found in Deep Learning Tool Keras

Posted on November 7, 2025November 7, 2025 By CWS

A vulnerability within the open supply library Keras might permit attackers to load arbitrary native information or conduct server-side request forgery (SSRF) assaults.

Offering a Python interface for synthetic neural networks, Keras is a deep studying API that can be utilized as a low-level cross-framework language for the constructing of AI fashions that work with JAX, TensorFlow, and PyTorch.

Tracked as CVE-2025-12058 (CVSS rating of 5.9), the medium-severity flaw exited as a result of the library’s StringLookup and IndexLookup preprocessing layers permit for file paths or URLs for use as inputs to outline vocabularies.

When Keras reconstructed the layers by loading a serialized mannequin, it could entry the referenced file paths throughout deserialization, with out correct validation or restriction, and incorporate the contents of the required information into the mannequin state.

“Which means that even when security measures like safe_mode are enabled, a malicious mannequin can nonetheless instruct Keras to entry native information or exterior URLs throughout load time, exposing delicate information or enabling distant community requests,” Zscaler explains.

In response to the corporate, this habits bypasses protected deserialization, permitting attackers to learn arbitrary native information, exfiltrate data via vocabularies, and conduct SSRF assaults.

In real-world situations, attackers might exploit the vulnerability by importing to public repositories malicious Keras fashions with specifically crafted vocabulary parameters, corresponding to these focusing on SSH keys.

When a sufferer downloads and hundreds the mannequin, throughout deserialization, their SSH personal keys are learn into the mannequin’s vocabulary. The attacker can retrieve the keys by redownloading the mannequin or via vocabulary exfiltration.Commercial. Scroll to proceed studying.

“Potential affect: full compromise of sufferer’s SSH entry to servers, code repositories, and cloud infrastructure. Attackers can pivot to lively intrusion: clone personal repos, inject backdoors or malicious commits into CI/CD, execute code in manufacturing, and transfer laterally,” Zscaler says.

If a malicious mannequin is deployed in cloud environments with occasion metadata providers, its loading in a VM permits attackers to retrieve IAM credentials and acquire full management over a company’s cloud assets.

The vulnerability was resolved in Keras model 3.11.4 by embedding vocabulary information immediately into the Keras archive and loading them from the archive upon initialization. It additionally disallows the loading of arbitrary vocabulary information when safe_mode is enabled.

Associated: Chrome 142 Replace Patches Excessive-Severity Flaws

Associated: Cisco Patches Essential Vulnerabilities in Contact Middle Equipment

Associated: Essential Vulnerabilities Patched in TP-Hyperlink’s Omada Gateways

Associated: Oracle Releases October 2025 Patches

Security Week News Tags:Data, Deep, Exposure, Keras, Learning, Tool, Vulnerability

Post navigation

Previous Post: ClickFix Attacks Against macOS Users Evolving
Next Post: Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks

Related Posts

Company and Personal Data Compromised in Recent Insight Partners Hack  Security Week News
Allianz Life Data Breach Impacts Most of 1.4 Million US Customers Security Week News
Slow and Steady Security: Lessons from the Tortoise and the Hare Security Week News
Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers Security Week News
Australia Enforces Ransomware Payment Reporting Security Week News
Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ClickFix Attacks Evolved With Weaponized Videos That Tricks Users via Self-infection Process
  • Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
  • Herodotus Android Banking Malware Takes Full Control Of Device Evading Antivirus
  • Hackers Can Attack Active Directory Sites to Escalate Privileges and Compromise the Domain
  • In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ClickFix Attacks Evolved With Weaponized Videos That Tricks Users via Self-infection Process
  • Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
  • Herodotus Android Banking Malware Takes Full Control Of Device Evading Antivirus
  • Hackers Can Attack Active Directory Sites to Escalate Privileges and Compromise the Domain
  • In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News