CVE-2025-54949: ExecuTorch: heap buffer overflow RCE via model loading
GHSA-9m39-3mf3-xwch CRITICAL CISA: TRACK*Any system loading ExecuTorch model files from untrusted or external sources is exposed to remote code execution — CVSS 9.8, no authentication or user interaction required. Patch to ExecuTorch 0.7.0 immediately and audit every pipeline or mobile app that ingests .pte model files. If patching is blocked, enforce strict model provenance controls as an interim control.
Risk Assessment
Critical severity. The CVSS vector (AV:N/AC:L/PR:N/UI:N) indicates full network exploitability with no preconditions — trivial to trigger once a malicious model is delivered. EPSS is low (0.0017) suggesting no active mass exploitation yet, but this is a prime target for supply chain attacks given ExecuTorch's use in production mobile and edge AI deployments. Blast radius is significant: successful exploitation yields full process compromise on the device running inference.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| executorch | pip | < 0.7.0 | 0.7.0 |
| executorch | pip | < 0.7.0 | 0.7.0 |
| org.pytorch:executorch-android | maven | < 0.7.0 | 0.7.0 |
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Patch immediately: upgrade to ExecuTorch 0.7.0 (pip, maven, source). The fix is in commit ede82493dae6d2d43f8c424e7be4721abe5242be.
-
Restrict model sources: enforce allowlisting of model origins — only load models from internally signed and checksummed sources.
-
Implement model integrity verification: SHA-256 checksums and code-signing for all model artifacts before loading.
-
Audit CI/CD and MLOps pipelines: identify any automated step that pulls ExecuTorch models from external registries (HuggingFace Hub, S3, CDNs).
-
Container and mobile scanning: scan Android APKs and Docker images for bundled executorch versions < 0.7.0.
-
Detection: monitor for unexpected process spawns or memory anomalies originating from model loading processes.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-54949?
Any system loading ExecuTorch model files from untrusted or external sources is exposed to remote code execution — CVSS 9.8, no authentication or user interaction required. Patch to ExecuTorch 0.7.0 immediately and audit every pipeline or mobile app that ingests .pte model files. If patching is blocked, enforce strict model provenance controls as an interim control.
Is CVE-2025-54949 actively exploited?
No confirmed active exploitation of CVE-2025-54949 has been reported, but organizations should still patch proactively.
How to fix CVE-2025-54949?
1. Patch immediately: upgrade to ExecuTorch 0.7.0 (pip, maven, source). The fix is in commit ede82493dae6d2d43f8c424e7be4721abe5242be. 2. Restrict model sources: enforce allowlisting of model origins — only load models from internally signed and checksummed sources. 3. Implement model integrity verification: SHA-256 checksums and code-signing for all model artifacts before loading. 4. Audit CI/CD and MLOps pipelines: identify any automated step that pulls ExecuTorch models from external registries (HuggingFace Hub, S3, CDNs). 5. Container and mobile scanning: scan Android APKs and Docker images for bundled executorch versions < 0.7.0. 6. Detection: monitor for unexpected process spawns or memory anomalies originating from model loading processes.
What systems are affected by CVE-2025-54949?
This vulnerability affects the following AI/ML architecture patterns: Edge inference (on-device ML), Mobile AI deployment (Android), Model serving pipelines, MLOps/CI model loading pipelines, AI supply chain / model registries.
What is the CVSS score for CVE-2025-54949?
CVE-2025-54949 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 0.27%.
Technical Details
NVD Description
A heap buffer overflow vulnerability in the loading of ExecuTorch models can potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit ede82493dae6d2d43f8c424e7be4721abe5242be
Exploitation Scenario
An adversary crafts a malicious ExecuTorch .pte model file that encodes a heap buffer overflow payload in its model structure. The attacker publishes this model to a public model repository (e.g., HuggingFace, GitHub Releases) or compromises an internal model registry. A target organization's MLOps pipeline or mobile app automatically downloads and loads the model for inference — triggering the overflow at parse time, before any inference logic executes. With CVSS AV:N and no authentication required, this scenario scales: a single poisoned model artifact can compromise every deployment that loads it. In mobile contexts, exploitation would yield arbitrary code execution within the app's sandbox.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
Timeline
Related Vulnerabilities
CVE-2025-30404 9.8 ExecuTorch: integer overflow RCE on model load
Same package: executorch CVE-2025-30405 9.8 ExecuTorch: integer overflow in model load → RCE
Same package: executorch CVE-2025-54951 9.8 ExecuTorch: heap buffer overflow RCE in model loading
Same package: executorch CVE-2025-54950 9.8 ExecuTorch: OOB read in model loader enables RCE
Same package: executorch CVE-2025-30402 8.1 ExecuTorch: heap overflow in method load, RCE risk
Same package: executorch
AI Threat Alert