CVE-2024-37055: MLflow: RCE via pmdarima model deserialization
HIGH PoC AVAILABLEAny MLflow deployment on v1.24.0+ is vulnerable to RCE if untrusted users can upload models. An attacker uploads a crafted pmdarima model; any user who loads it executes attacker-controlled code on their system. Patch immediately, restrict model upload permissions to verified users only, and audit your model registry for suspicious pmdarima artifacts.
Risk Assessment
High risk for shared MLflow deployments. CVSS 8.8 with low attack complexity means exploitation is straightforward once model upload access is obtained. The User Interaction requirement is easily met in MLOps workflows where engineers routinely load models from shared registries. Organizations with open model registries, collaborative ML environments, or CI/CD pipelines that auto-evaluate models face the highest exposure. No privileges required to stage the attack reduces the barrier significantly.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| mlflow | pip | — | No patch |
Do you use mlflow? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Patch: Upgrade MLflow to the latest version addressing this advisory per HiddenLayer's guidance.
-
Access control: Restrict model upload permissions to authenticated, vetted users only — treat model uploads as code deployments requiring review.
-
Audit: Scan the model registry for pmdarima models uploaded by unverified or external accounts, especially artifacts loaded by automated pipelines.
-
Detection: Log and alert on all model load events for pmdarima format; inspect pickle payloads where tooling permits.
-
Network isolation: Avoid exposing MLflow instances publicly; enforce strong authentication on all endpoints.
-
Compensating control: Block or sandbox pmdarima model load operations until patching is complete.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-37055?
Any MLflow deployment on v1.24.0+ is vulnerable to RCE if untrusted users can upload models. An attacker uploads a crafted pmdarima model; any user who loads it executes attacker-controlled code on their system. Patch immediately, restrict model upload permissions to verified users only, and audit your model registry for suspicious pmdarima artifacts.
Is CVE-2024-37055 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-37055, increasing the risk of exploitation.
How to fix CVE-2024-37055?
1. Patch: Upgrade MLflow to the latest version addressing this advisory per HiddenLayer's guidance. 2. Access control: Restrict model upload permissions to authenticated, vetted users only — treat model uploads as code deployments requiring review. 3. Audit: Scan the model registry for pmdarima models uploaded by unverified or external accounts, especially artifacts loaded by automated pipelines. 4. Detection: Log and alert on all model load events for pmdarima format; inspect pickle payloads where tooling permits. 5. Network isolation: Avoid exposing MLflow instances publicly; enforce strong authentication on all endpoints. 6. Compensating control: Block or sandbox pmdarima model load operations until patching is complete.
What systems are affected by CVE-2024-37055?
This vulnerability affects the following AI/ML architecture patterns: MLOps platforms, model registries, training pipelines, CI/CD ML pipelines, model serving.
What is the CVSS score for CVE-2024-37055?
CVE-2024-37055 has a CVSS v3.1 base score of 8.8 (HIGH). The EPSS exploitation probability is 0.44%.
Technical Details
NVD Description
Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.24.0 or newer, enabling a maliciously uploaded pmdarima model to run arbitrary code on an end user’s system when interacted with.
Exploitation Scenario
An adversary targets an organization using MLflow for experiment tracking. They obtain upload credentials via phishing or discover an unauthenticated MLflow instance exposed to the internet. They craft a pmdarima model file containing a malicious Python pickle payload — a reverse shell or credential harvester — and upload it to the shared model registry under a plausible experiment name. When a data scientist or automated CI/CD pipeline loads the model for evaluation or serving, the payload executes with the privileges of the loading process. The attacker pivots to training infrastructure, exfiltrates proprietary model weights, or implants persistent backdoors in the ML pipeline.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H References
- hiddenlayer.com/sai-security-advisory/mlflow-june2024 Exploit 3rd Party
Timeline
Related Vulnerabilities
CVE-2025-15379 10.0 MLflow: RCE via unsanitized model dependency specs
Same package: mlflow CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same package: mlflow CVE-2026-2635 9.8 mlflow: security flaw enables exploitation
Same package: mlflow CVE-2023-2780 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow CVE-2023-1177 9.8 MLflow: path traversal allows arbitrary file read/write
Same package: mlflow
AI Threat Alert