vLLM 中危 CVSS 9.8 远程代码执行漏洞暴露 AI 服务器
vLLM发现严重漏洞CVE-2025-47277,CVSS评分9.8。该漏洞通过PyNcclPipe中的不安全反序列化导致远程代码执行。攻击者可利用此漏洞控制服务器。问题源于PyTorch默认绑定所有接口。vLLM已修复并建议升级至v0.8.5以降低风险。 2025-5-21 00:43:40 Author: securityonline.info(查看原文) 阅读量:27 收藏

CVE-2025-29783 CVE-2025-32444 vLLM vulnerability vLLM, Remote Code Execution

A critical vulnerability—CVE-2025-47277—has been disclosed in vLLM, a high-performance inference and serving engine for large language models (LLMs). The flaw enables remote code execution (RCE) via an unsafe deserialization bug in the PyNcclPipe communication service, and has been assigned a CVSS score of 9.8.

Originally developed at UC Berkeley’s Sky Computing Lab, vLLM is now a community-driven project that provides a fast and easy-to-use library for LLM inference and serving. It supports distributed deployment, advanced KV cache management, and is integrated with industry-scale LLM infrastructure.

The vulnerability is present in the PyNcclPipe class, which facilitates KV cache transfer between distributed nodes using peer-to-peer messaging. The CPU-side message passing mechanism uses Python’s pickle module to serialize and deserialize data.

The PyNcclPipe implementation contains a critical security flaw where it directly processes client-provided data using pickle.loads, creating an unsafe deserialization vulnerability that can lead to Remote Code Execution,” the advisory explains.

By sending a maliciously crafted object to a running PyNcclPipe service, an attacker can exploit this flaw to execute arbitrary system commands on the host, effectively gaining full control of the server.

The root issue also traces back to PyTorch’s TCPStore binding behavior: “The default behavior from PyTorch is that the TCPStore interface will listen on ALL interfaces, regardless of what IP address is provided.”

vLLM has implemented a workaround to ensure it binds to a specified private interface, reducing the risk of exposure. Users are recommend to update immediately to vLLM v0.8.5.

Related Posts:


文章来源: https://securityonline.info/critical-cvss-9-8-rce-flaw-in-vllm-exposes-ai-hosts-to-remote-attacks/
如有侵权请联系:admin#unsafe.sh