Heimdal Security Blog

ShellTorch Vulnerabilities Expose PyTorch Models to Remote Code Execution

shelltorch vulnerabilities

ShellTorch vulnerabilities chain exposes tens of thousands of servers to remote code execution and data exfiltration.

Researchers revealed that the TorchServe flaws (including CVE-2023-43654, CVSS: 9.8) can expose sensitive data, compromise AI models, and run a full server takeover.

TorchServe is a famous open-source tool for serving and scaling PyTorch models in production. Organizations involved in AI model training and development, like Amazon, OpenAI, Tesla, Azure, Google, and Intel, are some of the tool`s users.

ShellTorch Vulnerabilities Explained

The vulnerability series includes three flaws, which the researchers collectively named ShellTorch. The flaws are:

When exploited together, the ShellTorch vulnerabilities grant threat actors:

Who Is at Risk?

Organizations that use TorchServe versions 0.3.0 through 0.8.1. are vulnerable to ShellTorch.

While scanning the Internet for vulnerable deployments, researchers found tens of thousands of IP addresses exposed to ShellTorch attacks. In order to find out if your organization is vulnerable, researchers advise using this free tool.

How to Stay Safe from ShellTorch

Users are urged to upgrade to TorchServe 0.8.2, the latest version which PyTorch released in August 28, 2023. The update displays a warning about the server-side request forgery vulnerability (CVE-2023-43654).

Other recommended safety measures, apart from patching, are:

If you liked this article, follow us on LinkedIn, Twitter, Facebook, and Youtube, for more cybersecurity news and topics.