Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Critical PickleScan Vulnerabilities Expose AI Model Supply Chains
News

Critical PickleScan Vulnerabilities Expose AI Model Supply Chains

Team-CWDBy Team-CWDDecember 2, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Three critical zero-day vulnerabilities affecting PickleScan, a widely used tool for scanning Python pickle files and PyTorch models, have been uncovered by cybersecurity researchers.

The flaws, all with a CVSS rating of 9.3, show how attackers could bypass model-scanning safeguards and distribute malicious machine learning models undetected.

The JFrog Security Research Team has described the vulnerabilities in an advisory published on 2 December.

Three Critical Flaws

The first flaw, CVE-2025-10155, involved a simple file extension bypass. Researchers found that renaming a malicious pickle file to a common PyTorch extension, such as .bin or .pt, caused PickleScan to misclassify the file type and hand it off to PyTorch-specific parsing logic. Because the scanner prioritized extensions over content inspection, the mismatch resulted in a failed scan while PyTorch still loaded the file normally.

A second issue, CVE-2025-10156, exposed a deeper gap between how PickleScan and PyTorch process ZIP archives. PickleScan depended on Python’s zipfile module, which threw exceptions when encountering Cyclic Redundancy Check (CRC) errors. PyTorch ignored these mismatches, so a corrupted archive containing malicious code could load successfully. Researchers demonstrated that zeroing CRC values in a PyTorch model archive caused PickleScan to fail, creating a blind spot that attackers could exploit to upload bypassed models.

The third vulnerability, CVE-2025-10157, allowed attackers to evade PickleScan’s blacklist of dangerous imports. Instead of referencing a flagged module directly, a malicious payload could call a subclass of that module, leading the scanner to label it only as “Suspicious.” A proof-of-concept (POC) using internal asyncio classes showed how arbitrary commands could execute during deserialization while avoiding a “Dangerous” classification.

Read more on AI supply chain security: AI Hallucinations Create “Slopsquatting” Supply Chain Threat

The findings highlight systemic risks, including:

  • Reliance on a single scanning tool

  • Divergent file-handling behavior between security tools and machine learning (ML) frameworks

  • Exposure to large-scale supply chain attacks across major model hubs

The vulnerabilities were disclosed to PickleScan maintainers on June 29, 2025, and patched on September 2, 2025.

JFrog recommended updating PickleScan to version 0.0.31, adopting layered defenses and shifting to safer formats such as Safetensors.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
Next Article Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What it is and how to protect yourself

January 8, 2026

Can password managers get hacked? Here’s what to know

November 14, 2025

AI-powered financial scams swamp social media

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.