CVE-2024-6577: TorchServe: unverified S3 bucket exposes benchmark data
GHSA-xx7c-j7h3-vjcq MEDIUM PoC AVAILABLE CISA: TRACK*TorchServe's benchmarking script uploads performance metrics to an S3 bucket without verifying ownership — if that bucket is unclaimed, an adversary can register it and silently receive your model benchmark telemetry. Audit whether your TorchServe deployments execute this script in any automated pipeline and block outbound access to `benchmarkai-metrics-prod` at the network layer immediately. Risk is low for standard inference workloads but meaningful for teams running automated benchmarking in CI/CD.
Risk Assessment
Medium risk in practice. EPSS of 0.00113 reflects very low current exploitation probability — the attack requires an adversary to have pre-claimed the specific S3 bucket name, limiting opportunistic exploitation. However, any organization running TorchServe benchmark scripts is silently leaking operational data to a potentially adversary-controlled endpoint with no error or alert. No official patch is available for torchserve <= 0.11.0, making workarounds the only remediation path.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| torchserve | pip | <= 0.11.0 | No patch |
Do you use torchserve? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Immediately audit all TorchServe deployments to determine if
upload_results_to_s3.shruns in any automated pipeline. -
Disable or remove the script if benchmarking uploads are not operationally required.
-
If the script must run, redirect it to an internally-owned, access-controlled S3 bucket under your AWS account.
-
Block outbound S3 traffic to
s3://benchmarkai-metrics-prodat egress firewall or VPC endpoint policy level. -
Review IAM roles assigned to TorchServe workloads — apply least privilege and revoke any S3 PutObject permissions not explicitly needed.
-
Enable CloudTrail and alert on unexpected S3 PutObject calls to external buckets from ML workload accounts. No upstream patch available; monitor the torchserve GitHub for a fix.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-6577?
TorchServe's benchmarking script uploads performance metrics to an S3 bucket without verifying ownership — if that bucket is unclaimed, an adversary can register it and silently receive your model benchmark telemetry. Audit whether your TorchServe deployments execute this script in any automated pipeline and block outbound access to `benchmarkai-metrics-prod` at the network layer immediately. Risk is low for standard inference workloads but meaningful for teams running automated benchmarking in CI/CD.
Is CVE-2024-6577 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2024-6577, increasing the risk of exploitation.
How to fix CVE-2024-6577?
1. Immediately audit all TorchServe deployments to determine if `upload_results_to_s3.sh` runs in any automated pipeline. 2. Disable or remove the script if benchmarking uploads are not operationally required. 3. If the script must run, redirect it to an internally-owned, access-controlled S3 bucket under your AWS account. 4. Block outbound S3 traffic to `s3://benchmarkai-metrics-prod` at egress firewall or VPC endpoint policy level. 5. Review IAM roles assigned to TorchServe workloads — apply least privilege and revoke any S3 PutObject permissions not explicitly needed. 6. Enable CloudTrail and alert on unexpected S3 PutObject calls to external buckets from ML workload accounts. No upstream patch available; monitor the torchserve GitHub for a fix.
What systems are affected by CVE-2024-6577?
This vulnerability affects the following AI/ML architecture patterns: model serving, MLOps CI/CD pipelines, benchmarking infrastructure, training pipelines.
What is the CVSS score for CVE-2024-6577?
CVE-2024-6577 has a CVSS v3.1 base score of 6.3 (MEDIUM). The EPSS exploitation probability is 0.16%.
Technical Details
NVD Description
In the latest version of pytorch/serve, the script 'upload_results_to_s3.sh' references the S3 bucket 'benchmarkai-metrics-prod' without ensuring its ownership or confirming its accessibility. This could lead to potential security vulnerabilities or unauthorized access to the bucket if it is not properly secured or claimed by the appropriate entity. The issue may result in data breaches, exposure of proprietary information, or unauthorized modifications to stored data.
Exploitation Scenario
An adversary searches GitHub and public documentation, identifies that TorchServe's `upload_results_to_s3.sh` hardcodes the bucket name `benchmarkai-metrics-prod`. They attempt to register this bucket in their own AWS account — if unclaimed, they succeed immediately. Any organization running TorchServe benchmarking pipelines (common in MLOps CI/CD for performance regression gating) will then automatically upload benchmark results to the adversary's bucket. The adversary passively collects inference throughput, latency baselines, and hardware telemetry over time, building a reconnaissance profile of the target's AI serving infrastructure. This data can inform subsequent targeted attacks such as resource exhaustion, model extraction timing, or infrastructure-specific exploits.
Weaknesses (CWE)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L References
Timeline
Related Vulnerabilities
CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same attack type: Data Leakage CVE-2025-5120 10.0 smolagents: sandbox escape enables unauthenticated RCE
Same attack type: Data Leakage CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same attack type: Data Extraction CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Data Extraction CVE-2025-59528 10.0 Flowise: Unauthenticated RCE via MCP config injection
Same attack type: Supply Chain
AI Threat Alert