CVE-2025-62608: mlx: security flaw enables exploitation
GHSA-w6vg-jg77-2qg6 CRITICAL PoC AVAILABLE CISA: TRACK*MLX, Apple's ML framework for Apple Silicon, has a critical heap buffer overflow triggered by malicious NumPy .npy files — no authentication or user interaction required. Any team using MLX to load externally-sourced datasets or model weights on Apple hardware is exposed to heap memory disclosure and potential RCE. Patch to 0.29.4 immediately and audit pipelines that ingest .npy files from untrusted sources.
Risk Assessment
CVSS 9.1 Critical with network-reachable, zero-privilege, zero-interaction attack vector makes this technically severe. Practical risk is moderated by low EPSS (0.00095) indicating limited current exploitation activity, and the specific hardware constraint (Apple Silicon). However, MLX adoption is growing rapidly among ML engineers and on-device AI developers — orgs with Apple Silicon MacBooks in ML pipelines have meaningful exposure, especially in dev/research environments where data provenance controls are weak.
Affected Systems
Severity & Risk
Attack Surface
Recommended Action
6 steps-
PATCH
Upgrade mlx to >= 0.29.4 via pip immediately — this is a one-line fix with no breaking changes.
-
INVENTORY
Identify all systems running MLX (pip list | grep mlx on Apple Silicon endpoints and CI runners).
-
INPUT VALIDATION
Implement file origin controls — reject .npy files not sourced from trusted, internal artifact registries; add hash verification for dataset files.
-
ISOLATION
Run MLX data loading in sandboxed processes where possible; restrict access to sensitive memory (credentials, keys) in processes that handle external .npy files.
-
DETECTION
Monitor for abnormal crashes in mlx processes, unexpected heap access violations in ML workloads, and unusual .npy file sources in pipeline logs.
-
CI/CD: Add MLX version pinning checks to CI pipelines to prevent regression to vulnerable versions.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-62608?
MLX, Apple's ML framework for Apple Silicon, has a critical heap buffer overflow triggered by malicious NumPy .npy files — no authentication or user interaction required. Any team using MLX to load externally-sourced datasets or model weights on Apple hardware is exposed to heap memory disclosure and potential RCE. Patch to 0.29.4 immediately and audit pipelines that ingest .npy files from untrusted sources.
Is CVE-2025-62608 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2025-62608, increasing the risk of exploitation.
How to fix CVE-2025-62608?
1. PATCH: Upgrade mlx to >= 0.29.4 via pip immediately — this is a one-line fix with no breaking changes. 2. INVENTORY: Identify all systems running MLX (pip list | grep mlx on Apple Silicon endpoints and CI runners). 3. INPUT VALIDATION: Implement file origin controls — reject .npy files not sourced from trusted, internal artifact registries; add hash verification for dataset files. 4. ISOLATION: Run MLX data loading in sandboxed processes where possible; restrict access to sensitive memory (credentials, keys) in processes that handle external .npy files. 5. DETECTION: Monitor for abnormal crashes in mlx processes, unexpected heap access violations in ML workloads, and unusual .npy file sources in pipeline logs. 6. CI/CD: Add MLX version pinning checks to CI pipelines to prevent regression to vulnerable versions.
What systems are affected by CVE-2025-62608?
This vulnerability affects the following AI/ML architecture patterns: training pipelines, data preprocessing pipelines, model fine-tuning workflows, on-device inference, MLOps CI/CD pipelines.
What is the CVSS score for CVE-2025-62608?
CVE-2025-62608 has a CVSS v3.1 base score of 9.1 (CRITICAL). The EPSS exploitation probability is 0.09%.
Technical Details
NVD Description
MLX is an array framework for machine learning on Apple silicon. Prior to version 0.29.4, there is a heap buffer overflow in mlx::core::load() when parsing malicious NumPy .npy files. Attacker-controlled file causes 13-byte out-of-bounds read, leading to crash or information disclosure. This issue has been patched in version 0.29.4.
Exploitation Scenario
Adversary targets an ML engineering team's data ingestion pipeline. They publish a poisoned NumPy dataset to a public repository (Hugging Face, Kaggle, or GitHub) or compromise an internal data storage bucket. A data scientist or automated training pipeline calls mlx.load() on the malicious .npy file on their Apple Silicon MacBook or M-series Mac mini training node. The crafted file triggers the heap buffer overflow in mlx::core::load(), causing a 13-byte out-of-bounds read that leaks adjacent heap memory — potentially exposing API keys, model weights, or other secrets loaded earlier in the process. In a CI/CD context with automated training jobs, this could be fully unattended exploitation.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H References
Timeline
Related Vulnerabilities
CVE-2025-62609 7.5 mlx: security flaw enables exploitation
Same package: mlx CVE-2023-3765 10.0 MLflow: path traversal allows arbitrary file read
Same attack type: Supply Chain CVE-2025-2828 10.0 LangChain RequestsToolkit: SSRF exposes cloud metadata
Same attack type: Data Extraction CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same attack type: Data Extraction CVE-2025-5120 10.0 smolagents: sandbox escape enables unauthenticated RCE
Same attack type: Supply Chain
AI Threat Alert