ExecuTorch's on-device inference runtime crashes and may allow code execution when loading maliciously crafted model files. Any mobile or edge AI deployment using ExecuTorch <= 0.6.0 should upgrade to 0.7.0 immediately — this includes Android apps using the Maven package. If models are loaded from external or user-controlled sources, treat this as critical regardless of EPSS score.
Risk Assessment
CVSS 8.1 (High) with very low EPSS (0.00096), not in CISA KEV. User interaction is required (UI:R), meaning exploitation likely requires a victim to load a crafted model file. Attack complexity is low and no privileges are needed, making it accessible to motivated attackers. The main risk vector is supply chain: orgs that pull models from public hubs, CDNs, or allow user-supplied model files are materially exposed. Confidentiality and availability both rated High — a successful exploit could crash the runtime or exfiltrate on-device data.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| executorch | pip | <= 0.6.0 | 0.7.0-rc1 |
| executorch | pip | <= 0.6.0 | 0.7.0 |
| org.pytorch:executorch-android | maven | <= 0.6.0 | 0.7.0-rc1 |
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Upgrade: pip install executorch>=0.7.0 or update Maven dependency to executorch-android:0.7.0-rc1.
-
Verify commit 93b1a0c15f7eda49b2bc46b5b4c49557b4e9810f is included in your build if using a custom build from source.
-
Restrict model loading to cryptographically signed, internally-verified model files only — reject unsigned or third-party model artifacts.
-
Audit OTA model update pipelines for integrity checks and chain-of-custody validation.
-
For Android deployments, check if the Maven package version is pinned in build.gradle and force update.
-
Detection: monitor for abnormal process crashes in inference workers; heap overflow exploits often leave crash signatures in logcat/syslog before achieving stable execution.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-30402?
ExecuTorch's on-device inference runtime crashes and may allow code execution when loading maliciously crafted model files. Any mobile or edge AI deployment using ExecuTorch <= 0.6.0 should upgrade to 0.7.0 immediately — this includes Android apps using the Maven package. If models are loaded from external or user-controlled sources, treat this as critical regardless of EPSS score.
Is CVE-2025-30402 actively exploited?
No confirmed active exploitation of CVE-2025-30402 has been reported, but organizations should still patch proactively.
How to fix CVE-2025-30402?
1. Upgrade: pip install executorch>=0.7.0 or update Maven dependency to executorch-android:0.7.0-rc1. 2. Verify commit 93b1a0c15f7eda49b2bc46b5b4c49557b4e9810f is included in your build if using a custom build from source. 3. Restrict model loading to cryptographically signed, internally-verified model files only — reject unsigned or third-party model artifacts. 4. Audit OTA model update pipelines for integrity checks and chain-of-custody validation. 5. For Android deployments, check if the Maven package version is pinned in build.gradle and force update. 6. Detection: monitor for abnormal process crashes in inference workers; heap overflow exploits often leave crash signatures in logcat/syslog before achieving stable execution.
What systems are affected by CVE-2025-30402?
This vulnerability affects the following AI/ML architecture patterns: on-device model inference, mobile ML deployment, edge AI / embedded inference, model serving, OTA model update pipelines.
What is the CVSS score for CVE-2025-30402?
CVE-2025-30402 has a CVSS v3.1 base score of 8.1 (HIGH). The EPSS exploitation probability is 0.43%.
Technical Details
NVD Description
A heap-buffer-overflow vulnerability in the loading of ExecuTorch methods can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 93b1a0c15f7eda49b2bc46b5b4c49557b4e9810f
Exploitation Scenario
An adversary crafts a malicious ExecuTorch model file (.pte) with a specially constructed method structure designed to trigger a heap buffer overflow during the method-loading phase. The attacker hosts this file on a public model repository (e.g., HuggingFace, a CDN, or a compromised model registry). A mobile app or edge device with an automatic model update feature downloads and loads the malicious file. The overflow corrupts heap memory, potentially overwriting function pointers or return addresses, enabling arbitrary code execution in the context of the inference process — which may have access to local sensor data, credentials stored on device, or serve as a pivot into the broader device OS.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H References
Timeline
Related Vulnerabilities
CVE-2025-54949 9.8 ExecuTorch: heap buffer overflow RCE via model loading
Same package: executorch CVE-2025-30405 9.8 ExecuTorch: integer overflow in model load → RCE
Same package: executorch CVE-2025-54950 9.8 ExecuTorch: OOB read in model loader enables RCE
Same package: executorch CVE-2025-54951 9.8 ExecuTorch: heap buffer overflow RCE in model loading
Same package: executorch CVE-2025-30404 9.8 ExecuTorch: integer overflow RCE on model load
Same package: executorch
AI Threat Alert