top of page

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

3 december 2025 om 09:30:00

thehackernews.com

Three critical security vulnerabilities discovered in Picklescan, an open-source security scanner for Python pickle files. The flaws allow malicious actors to bypass the tool's protections and execute arbitrary code by loading untrusted PyTorch models. Picklescan is designed to parse Python pickle files and detect suspicious content, but these vulnerabilities effectively render its security protections useless. The bypass could enable supply chain attacks targeting machine learning workflows that rely on PyTorch models. Organizations using Picklescan for security scanning of ML models are at risk of code execution attacks.

Related links:

Related CVE's:

No CVEs found in this article

Related threat actors:

No threat actors found in this article

Affected products:

PicklescanPyTorch

IOC's:

No IOCs found in this article

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page