Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Data Exposure Vulnerability Found in Deep Learning Tool Keras

Posted on November 7, 2025November 7, 2025 By CWS

A vulnerability within the open supply library Keras might permit attackers to load arbitrary native information or conduct server-side request forgery (SSRF) assaults.

Offering a Python interface for synthetic neural networks, Keras is a deep studying API that can be utilized as a low-level cross-framework language for the constructing of AI fashions that work with JAX, TensorFlow, and PyTorch.

Tracked as CVE-2025-12058 (CVSS rating of 5.9), the medium-severity flaw exited as a result of the library’s StringLookup and IndexLookup preprocessing layers permit for file paths or URLs for use as inputs to outline vocabularies.

When Keras reconstructed the layers by loading a serialized mannequin, it could entry the referenced file paths throughout deserialization, with out correct validation or restriction, and incorporate the contents of the required information into the mannequin state.

“Which means that even when security measures like safe_mode are enabled, a malicious mannequin can nonetheless instruct Keras to entry native information or exterior URLs throughout load time, exposing delicate information or enabling distant community requests,” Zscaler explains.

In response to the corporate, this habits bypasses protected deserialization, permitting attackers to learn arbitrary native information, exfiltrate data via vocabularies, and conduct SSRF assaults.

In real-world situations, attackers might exploit the vulnerability by importing to public repositories malicious Keras fashions with specifically crafted vocabulary parameters, corresponding to these focusing on SSH keys.

When a sufferer downloads and hundreds the mannequin, throughout deserialization, their SSH personal keys are learn into the mannequin’s vocabulary. The attacker can retrieve the keys by redownloading the mannequin or via vocabulary exfiltration.Commercial. Scroll to proceed studying.

“Potential affect: full compromise of sufferer’s SSH entry to servers, code repositories, and cloud infrastructure. Attackers can pivot to lively intrusion: clone personal repos, inject backdoors or malicious commits into CI/CD, execute code in manufacturing, and transfer laterally,” Zscaler says.

If a malicious mannequin is deployed in cloud environments with occasion metadata providers, its loading in a VM permits attackers to retrieve IAM credentials and acquire full management over a company’s cloud assets.

The vulnerability was resolved in Keras model 3.11.4 by embedding vocabulary information immediately into the Keras archive and loading them from the archive upon initialization. It additionally disallows the loading of arbitrary vocabulary information when safe_mode is enabled.

Associated: Chrome 142 Replace Patches Excessive-Severity Flaws

Associated: Cisco Patches Essential Vulnerabilities in Contact Middle Equipment

Associated: Essential Vulnerabilities Patched in TP-Hyperlink’s Omada Gateways

Associated: Oracle Releases October 2025 Patches

Security Week News Tags:Data, Deep, Exposure, Keras, Learning, Tool, Vulnerability

Post navigation

Previous Post: ClickFix Attacks Against macOS Users Evolving
Next Post: Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks

Related Posts

Healthcare Services Group Data Breach Impacts 624,000 Security Week News
Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites Security Week News
MATLAB Maker MathWorks Recovering From Ransomware Attack Security Week News
Inside the Dark Web’s Access Economy: How Hackers Sell the Keys to Enterprise Networks Security Week News
Slow and Steady Security: Lessons from the Tortoise and the Hare Security Week News
Google Warns UK Retailer Hackers Now Targeting US Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark