CVE-2024-43598: LightGBM: heap buffer overflow enables network RCE

GHSA-2586-f3p4-hq84 HIGH
Published November 12, 2024
CISO Take

LightGBM versions before 4.6.0 contain a heap-based buffer overflow exploitable over the network without authentication, enabling full remote code execution. Any ML pipeline, training cluster, or inference service running LightGBM < 4.6.0 with network exposure is at risk. Patch immediately to 4.6.0 and audit all environments — training clusters, Jupyter servers, Docker images, and CI/CD pipelines.

Risk Assessment

High risk (CVSS 8.1). Network-accessible RCE with no privileges required makes this dangerous for exposed ML infrastructure. Attack complexity is high (AC:H), reducing opportunistic exploitation, but targeted attacks against known ML infrastructure are realistic. ML environments are frequently under-patched and often run with elevated privileges, amplifying post-exploitation impact. EPSS of 1.6% indicates low observed exploitation to date, but LightGBM's massive adoption across data science and production ML stacks means the attack surface is substantial.

Affected Systems

Package Ecosystem Vulnerable Range Patched
lightgbm pip No patch
18.3K OpenSSF 6.2 984 dependents Pushed 7d ago 50% patched ~98d to patch Full package profile →
lightgbm pip >= 1.0.0, < 4.6.0 4.6.0
18.3K OpenSSF 6.2 984 dependents Pushed 7d ago 50% patched ~98d to patch Full package profile →

Severity & Risk

CVSS 3.1
8.1 / 10
EPSS
1.7%
chance of exploitation in 30 days
Higher than 82% of all CVEs
Exploitation Status
No known exploitation
Sophistication
Advanced

Attack Surface

AV AC PR UI S C I A
AV Network
AC High
PR None
UI None
S Unchanged
C High
I High
A High

Recommended Action

5 steps
  1. PATCH

    Upgrade lightgbm to >= 4.6.0 immediately (pip install --upgrade lightgbm).

  2. AUDIT

    Run pip list | grep lightgbm across all ML environments — training clusters, Jupyter servers, Lambda functions, Docker images, CI/CD runners.

  3. CONTAINER REBUILD

    Identify and rebuild all Docker images embedding lightgbm < 4.6.0; treat as compromised if exposed to untrusted network traffic.

  4. ISOLATE

    Ensure LightGBM inference services are not directly internet-accessible; enforce network segmentation between ML infrastructure and production.

  5. DETECT

    Review logs for anomalous traffic patterns to LightGBM prediction endpoints, unexpected outbound connections from ML nodes, or unusual process spawning from model serving processes.

CISA SSVC Assessment

Decision Track
Exploitation none
Automatable Yes
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Art. 9 - Risk management system for high-risk AI
ISO 42001
A.6.2.6 - AI system vulnerability management
NIST AI RMF
GOVERN 6.1 - Policies for third-party AI risk MANAGE 2.2 - Mechanisms to sustain AI system trustworthiness

Frequently Asked Questions

What is CVE-2024-43598?

LightGBM versions before 4.6.0 contain a heap-based buffer overflow exploitable over the network without authentication, enabling full remote code execution. Any ML pipeline, training cluster, or inference service running LightGBM < 4.6.0 with network exposure is at risk. Patch immediately to 4.6.0 and audit all environments — training clusters, Jupyter servers, Docker images, and CI/CD pipelines.

Is CVE-2024-43598 actively exploited?

No confirmed active exploitation of CVE-2024-43598 has been reported, but organizations should still patch proactively.

How to fix CVE-2024-43598?

1. PATCH: Upgrade lightgbm to >= 4.6.0 immediately (`pip install --upgrade lightgbm`). 2. AUDIT: Run `pip list | grep lightgbm` across all ML environments — training clusters, Jupyter servers, Lambda functions, Docker images, CI/CD runners. 3. CONTAINER REBUILD: Identify and rebuild all Docker images embedding lightgbm < 4.6.0; treat as compromised if exposed to untrusted network traffic. 4. ISOLATE: Ensure LightGBM inference services are not directly internet-accessible; enforce network segmentation between ML infrastructure and production. 5. DETECT: Review logs for anomalous traffic patterns to LightGBM prediction endpoints, unexpected outbound connections from ML nodes, or unusual process spawning from model serving processes.

What systems are affected by CVE-2024-43598?

This vulnerability affects the following AI/ML architecture patterns: training pipelines, model serving, batch prediction systems, AutoML platforms, feature engineering pipelines, MLOps platforms.

What is the CVSS score for CVE-2024-43598?

CVE-2024-43598 has a CVSS v3.1 base score of 8.1 (HIGH). The EPSS exploitation probability is 1.68%.

Technical Details

NVD Description

LightGBM Remote Code Execution Vulnerability

Exploitation Scenario

An adversary identifies a network-accessible LightGBM prediction API — for example, a FastAPI service wrapping a gradient boosting model for fraud detection or ranking. By sending a specially crafted payload (malformed model file or adversarial input) that triggers the heap buffer overflow during LightGBM's prediction parsing, the attacker achieves RCE on the inference server without any credentials. From there, they exfiltrate model artifacts, training data, and cloud credentials stored in the environment, pivot laterally to internal ML infrastructure (MLflow, feature stores, S3 buckets), or implant backdoors in model artifacts to extend the compromise through the ML supply chain.

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

Published
November 12, 2024
Last Modified
February 18, 2025
First Seen
November 12, 2024

Related Vulnerabilities