CVE-2025-55551: PyTorch: DoS in linalg.lu via malformed slice op

HIGH CISA: TRACK*
Published September 25, 2025
CISO Take

Any PyTorch-based inference service exposed to untrusted input is at risk of remote crash with no authentication required. If your ML serving infrastructure uses torch.linalg.lu (common in scientific and financial ML pipelines), treat this as an urgent patching item. Until v2.8.0 is patched, firewall PyTorch endpoints from public access or add input shape validation at the API layer.

Risk Assessment

HIGH operational risk for organizations running PyTorch in production serving roles. CVSS 7.5 is backed by AV:N/AC:L/PR:N/UI:N — an unauthenticated remote attacker with network reach to a PyTorch-backed service can crash it with a single crafted request. No exploit complexity, no foothold required. PoC exists publicly (GitHub gist referenced in NVD). Not in CISA KEV yet, but the low barrier to exploitation means weaponization is trivial.

Affected Systems

Package Ecosystem Vulnerable Range Patched
pytorch pip No patch
99.6K OpenSSF 6.4 21.7K dependents Pushed 6d ago 8% patched ~142d to patch Full package profile →

Do you use pytorch? You're affected.

Severity & Risk

CVSS 3.1
7.5 / 10
EPSS
0.1%
chance of exploitation in 30 days
Higher than 28% of all CVEs
Exploitation Status
Exploit Available
Exploitation: MEDIUM
Sophistication
Trivial
Exploitation Confidence
medium
CISA SSVC: Public PoC
Composite signal derived from CISA KEV, CISA SSVC, EPSS, trickest/cve, and Nuclei templates.

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR None
UI None
S Unchanged
C None
I None
A High

Recommended Action

5 steps
  1. PATCH

    Pin PyTorch to a version prior to 2.8.0 or await official patch — no patched version is confirmed yet; monitor https://github.com/pytorch/pytorch/issues/151401 for resolution.

  2. WORKAROUND

    Add input validation before any torch.linalg.lu call — validate tensor shape, dtype, and dimension constraints at the API boundary.

  3. NETWORK

    Restrict PyTorch inference endpoints to authenticated, internal traffic only; block public exposure of linalg-capable endpoints.

  4. DETECT

    Monitor for abnormal process termination or OOM events on model serving nodes; alert on repeated 5xx errors from inference endpoints.

  5. ISOLATE

    Run inference workloads in containerized environments with resource limits (memory/CPU cgroups) to contain blast radius of DoS.

CISA SSVC Assessment

Decision Track*
Exploitation poc
Automatable Yes
Technical Impact partial

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 15 - Accuracy, robustness and cybersecurity
ISO 42001
6.1.2 - AI risk assessment 8.4 - AI system operation and monitoring
NIST AI RMF
MANAGE-2.2 - Mechanisms to sustain AI system availability MAP-5.1 - Likelihood and magnitude of impacts from third-party dependencies
OWASP LLM Top 10
LLM04:2025 - Model Denial of Service

Frequently Asked Questions

What is CVE-2025-55551?

Any PyTorch-based inference service exposed to untrusted input is at risk of remote crash with no authentication required. If your ML serving infrastructure uses torch.linalg.lu (common in scientific and financial ML pipelines), treat this as an urgent patching item. Until v2.8.0 is patched, firewall PyTorch endpoints from public access or add input shape validation at the API layer.

Is CVE-2025-55551 actively exploited?

No confirmed active exploitation of CVE-2025-55551 has been reported, but organizations should still patch proactively.

How to fix CVE-2025-55551?

1. PATCH: Pin PyTorch to a version prior to 2.8.0 or await official patch — no patched version is confirmed yet; monitor https://github.com/pytorch/pytorch/issues/151401 for resolution. 2. WORKAROUND: Add input validation before any torch.linalg.lu call — validate tensor shape, dtype, and dimension constraints at the API boundary. 3. NETWORK: Restrict PyTorch inference endpoints to authenticated, internal traffic only; block public exposure of linalg-capable endpoints. 4. DETECT: Monitor for abnormal process termination or OOM events on model serving nodes; alert on repeated 5xx errors from inference endpoints. 5. ISOLATE: Run inference workloads in containerized environments with resource limits (memory/CPU cgroups) to contain blast radius of DoS.

What systems are affected by CVE-2025-55551?

This vulnerability affects the following AI/ML architecture patterns: model serving, inference APIs, training pipelines, ML platform (multi-tenant), scientific/numerical ML workloads.

What is the CVSS score for CVE-2025-55551?

CVE-2025-55551 has a CVSS v3.1 base score of 7.5 (HIGH). The EPSS exploitation probability is 0.10%.

Technical Details

NVD Description

An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation.

Exploitation Scenario

Adversary identifies an exposed ML inference API (e.g., TorchServe or a FastAPI endpoint) that accepts matrix inputs for a scientific or financial ML model. They review the public PoC gist, craft a minimal HTTP POST with a tensor designed to trigger the malformed slice operation in torch.linalg.lu, and send it. The PyTorch worker crashes or hangs, taking down the inference service. Repeated requests prevent recovery. In a multi-tenant ML platform, this could deny service to all tenants sharing the PyTorch backend.

Weaknesses (CWE)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Timeline

Published
September 25, 2025
Last Modified
October 3, 2025
First Seen
September 25, 2025

Related Vulnerabilities