Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

Posted on December 3, 2025December 3, 2025 By CWS

Dec 03, 2025Ravie LakshmananMachine Studying / Vulnerability
Three essential safety flaws have been disclosed in an open-source utility known as Picklescan that might enable malicious actors to execute arbitrary code by loading untrusted PyTorch fashions, successfully bypassing the device’s protections.
Picklescan, developed and maintained by Matthieu Maitre (@mmaitre314), is a safety scanner that is designed to parse Python pickle recordsdata and detect suspicious imports or operate calls, earlier than they’re executed. Pickle is a extensively used serialization format in machine studying, together with PyTorch, which makes use of the format to save lots of and cargo fashions.
However pickle recordsdata may also be an enormous safety threat, as they can be utilized to robotically set off the execution of arbitrary Python code when they’re loaded. This necessitates that customers and organizations load trusted fashions, or load mannequin weights from TensorFlow and Flax.
The problems found by JFrog primarily make it attainable to bypass the scanner, current the scanned mannequin recordsdata as protected, and allow malicious code to be executed, which may then pave the way in which for a provide chain assault.

“Every found vulnerability allows attackers to evade PickleScan’s malware detection and doubtlessly execute a large-scale provide chain assault by distributing malicious ML fashions that conceal undetectable malicious code,” safety researcher David Cohen mentioned.
Picklescan, at its core, works by analyzing the pickle recordsdata at bytecode degree and checking the outcomes towards a blocklist of recognized hazardous imports and operations to flag comparable conduct. This method, versus allowlisting, additionally implies that it prevents the instruments from detecting any new assault vector and requires the builders to have in mind all attainable malicious behaviors.

The recognized flaws are as follows –

CVE-2025-10155 (CVSS rating: 9.3/7.8) – A file extension bypass vulnerability that can be utilized to undermine the scanner and cargo the mannequin when offering a typical pickle file with a PyTorch-related extension comparable to .bin or .pt
CVE-2025-10156 (CVSS rating: 9.3/7.5) – A bypass vulnerability that can be utilized to disable ZIP archive scanning by introducing a Cyclic Redundancy Test (CRC) error
CVE-2025-10157 (CVSS rating: 9.3/8.3) – A bypass vulnerability that can be utilized to undermine Picklescan’s unsafe globals verify, resulting in arbitrary code execution by getting round a blocklist of harmful imports

Profitable exploitation of the aforementioned flaws may enable attackers to hide malicious pickle payloads inside recordsdata utilizing frequent PyTorch extensions, intentionally introduce CRC errors into ZIP archives containing malicious fashions, or craft malicious PyTorch fashions with embedded pickle payloads to bypass the scanner.

Following accountable disclosure on June 29, 2025, the three vulnerabilities have been addressed in Picklescan model 0.0.31 launched on September 9.
The findings illustrate some key systemic points, together with the reliance on a single scanning device, discrepancies in file-handling conduct between safety instruments and PyTorch, thereby rendering safety architectures weak to assaults.
“AI libraries like PyTorch develop extra complicated by the day, introducing new options, mannequin codecs, and execution pathways quicker than safety scanning instruments can adapt,” Cohen mentioned. “This widening hole between innovation and safety leaves organizations uncovered to rising threats that typical instruments merely weren’t designed to anticipate.”
“Closing this hole requires a research-backed safety proxy for AI fashions, constantly knowledgeable by specialists who suppose like each attackers and defenders. By actively analyzing new fashions, monitoring library updates, and uncovering novel exploitation methods, this method delivers adaptive, intelligence-driven safety towards the vulnerabilities that matter most.”

The Hacker News Tags:Bugs, Code, Evade, Execute, Malicious, Models, Picklescan, PyTorch, Scans

Post navigation

Previous Post: BPFDoor and Symbiote Rootkits Attacking Linux Systems Exploiting eBPF Filters
Next Post: Angular Platform Vulnerability Allows Malicious Code Execution Via Weaponized SVG Animation Files

Related Posts

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch The Hacker News
Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry The Hacker News
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer The Hacker News
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog The Hacker News
Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails The Hacker News
DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark