CVE-2024-37052: MLflow: RCE via malicious scikit-learn model upload
HIGH PoC AVAILABLEAny shared MLflow instance where users can upload models is exposed to remote code execution — an attacker needs only publish a crafted scikit-learn model and wait for a colleague or pipeline to load it. Patch MLflow immediately; until patched, restrict model upload permissions to trusted CI/CD service accounts only and audit recent model artifacts for suspicious submissions. This is a direct, practical threat to your ML platform supply chain with low exploitation complexity.
Risk Assessment
High severity (CVSS 8.8). MLflow is ubiquitous in enterprise ML environments, and shared model registries with multi-user write access are the norm in data science teams. Exploitation requires no elevated privileges on the MLflow instance — only the ability to upload a model file, which is routinely granted to developers, data scientists, and CI/CD systems. Low complexity and broad organizational exposure make this a practical, high-likelihood threat. The payload executes with the victim's OS user privileges, enabling lateral movement, credential theft, or data exfiltration from the ML environment.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| mlflow | pip | — | No patch |
Do you use mlflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Patch: Upgrade MLflow to the latest patched release immediately — treat as emergency change for production ML platforms.
-
Access control: Restrict model upload to authenticated CI/CD service accounts; remove interactive write access for human users where feasible.
-
Model scanning: Integrate pre-load artifact scanning using tools designed to detect malicious pickle payloads (e.g., ProtectAI ModelScan, picklescan) into your ML pipeline gates.
-
Network segmentation: Ensure MLflow servers are not internet-accessible; enforce VPN or bastion access for all registry interactions.
-
Detection: Monitor for unexpected process spawning from Python interpreter processes and anomalous outbound connections originating from ML workstations or pipeline workers.
-
Audit: Review the model upload history for all artifacts uploaded by external contributors or during the exposure window — consider re-validating or purging unverified models.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-37052?
Any shared MLflow instance where users can upload models is exposed to remote code execution — an attacker needs only publish a crafted scikit-learn model and wait for a colleague or pipeline to load it. Patch MLflow immediately; until patched, restrict model upload permissions to trusted CI/CD service accounts only and audit recent model artifacts for suspicious submissions. This is a direct, practical threat to your ML platform supply chain with low exploitation complexity.
Is CVE-2024-37052 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-37052, increasing the risk of exploitation.
How to fix CVE-2024-37052?
1. Patch: Upgrade MLflow to the latest patched release immediately — treat as emergency change for production ML platforms. 2. Access control: Restrict model upload to authenticated CI/CD service accounts; remove interactive write access for human users where feasible. 3. Model scanning: Integrate pre-load artifact scanning using tools designed to detect malicious pickle payloads (e.g., ProtectAI ModelScan, picklescan) into your ML pipeline gates. 4. Network segmentation: Ensure MLflow servers are not internet-accessible; enforce VPN or bastion access for all registry interactions. 5. Detection: Monitor for unexpected process spawning from Python interpreter processes and anomalous outbound connections originating from ML workstations or pipeline workers. 6. Audit: Review the model upload history for all artifacts uploaded by external contributors or during the exposure window — consider re-validating or purging unverified models.
What systems are affected by CVE-2024-37052?
This vulnerability affects the following AI/ML architecture patterns: model registries, training pipelines, MLOps platforms, model serving, CI/CD model evaluation.
What is the CVSS score for CVE-2024-37052?
CVE-2024-37052 has a CVSS v3.1 base score of 8.8 (HIGH). The EPSS exploitation probability is 0.32%.
Technical Details
NVD Description
Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user’s system when interacted with.
Exploitation Scenario
An adversary with model-upload access to a shared MLflow registry — via a compromised developer account, malicious insider, or external collaborator with granted access — crafts a scikit-learn model file embedding a malicious pickle payload using standard Python tooling (trivial, publicly documented technique). The attacker registers the model under a plausible, trusted-looking name in the MLflow UI. When a data scientist calls mlflow.sklearn.load_model() during experimentation, or an automated CI/CD pipeline loads the model for evaluation, the payload executes in the victim's process context. From here the attacker can establish a reverse shell, exfiltrate AWS/GCP credentials from environment variables or ~/.aws, access training datasets, or pivot into internal infrastructure. In pipeline contexts this can propagate to production systems before detection.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H References
- hiddenlayer.com/sai-security-advisory/mlflow-june2024 Exploit 3rd Party
- github.com/averinaleks/bot Exploit
- github.com/thehalvo/homeostasis Exploit
Timeline
Related Vulnerabilities
CVE-2025-15379 10.0 MLflow: RCE via unsanitized model dependency specs
Same package: mlflow CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same package: mlflow CVE-2026-2635 9.8 mlflow: security flaw enables exploitation
Same package: mlflow CVE-2023-2780 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2023-1177 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow
AI Threat Alert