HiddenLayer, a Gartner recognized Cool Vendor for AI Security, is the leading provider of Security for AI. Its security platform helps enterprises safeguard the machine learning models behind their most important products. HiddenLayer is the only company to offer turnkey security for AI that does not add unnecessary complexity to models and does not require access to raw data and algorithms. Founded by a team with deep roots in security and ML, HiddenLayer aims to protect enterprise’s AI from inference, bypass, extraction attacks, and model theft. The company is backed by a group of strategic investors, including M12, Microsoft’s Venture Fund, Moore Strategic Ventures, Booz Allen Ventures, IBM Ventures, and Capital One Ventures.
Security Advisory
HiddenLayer’s Synaptic Adversarial Intelligence (SAI) team consists of multidisciplinary cybersecurity experts and data scientists dedicated to raising awareness about threats to machine learning and artificial intelligence systems. Our mission is to educate data scientists, MLDevOps teams, and cybersecurity practitioners on evaluating ML/AI vulnerabilities and risks, promoting more security-conscious implementations and deployments.
During our research, we identify numerous vulnerabilities within ML/AI projects. While our research blogs cover those that we consider to be most impactful, some affect only specific projects or use cases. We’ve therefore created this dedicated space to share all of our findings, enabling users within our community to keep updated on new vulnerabilities, including security issues that have not been assigned a CVE.
December 2024
-
SAI-ADV-2024-004 keras.models.load_model when scanning .h5 files leads to arbitrary code execution December 16, 2024
keras.models.load_model when scanning .h5 files leads to arbitrary code execution CVE Number SAI-ADV-2024-004 Summary A vulnerability...Read More -
SAI-ADV-2024-005 keras.models.load_model when scanning .pb files leads to arbitrary code execution December 16, 2024
keras.models.load_model when scanning .h5 files leads to arbitrary code execution CVE Number SAI-ADV-2024-004 Summary A vulnerability...Read More
October 2024
-
NVIDIA NeMo
Unsafe extraction of NeMo archive leading to arbitrary file write CVE Number CVE-2024-0129 Summary The _unpack_nemo_file function used...Read More
September 2024
-
CVE-2024-45858 Eval on XML parameters allows arbitrary code execution when loading RAIL file September 18, 2024
Eval on XML parameters allows arbitrary code execution when loading RAIL file CVE Number CVE-2024-45858 Summary...Read More -
CVE-2024-27321 Eval on CSV data allows arbitrary code execution in the MLCTaskValidate class September 12, 2024
Eval on CSV data allows arbitrary code execution in the ClassificationTaskValidate class CVE Number CVE-2024-27320 Summary...Read More -
CVE-2024-27320 Eval on CSV data allows arbitrary code execution in the ClassificationTaskValidate class September 12, 2024
Eval on CSV data allows arbitrary code execution in the ClassificationTaskValidate class CVE Number CVE-2024-27320 Summary...Read More -
CVE-2024-45857 Unsafe deserialization in Datalab leads to arbitrary code execution September 12, 2024
Unsafe deserialization in Datalab leads to arbitrary code execution CVE Number CVE-2024-45857 Summary An arbitrary code...Read More -
CVE-2024-45846 Eval on query parameters allows arbitrary code execution in Weaviate integration September 12, 2024
Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An...Read More -
CVE-2024-45847 Eval on query parameters allows arbitrary code execution in Vector Database integrations September 12, 2024
Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An...Read More -
CVE-2024-45848 Eval on query parameters allows arbitrary code execution in ChromaDB integration September 12, 2024
Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An...Read More -
CVE-2024-45849 Eval on query parameters allows arbitrary code execution in SharePoint integration list creation September 12, 2024
Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An...Read More -
CVE-2024-45850 Eval on query parameters allows arbitrary code execution in SharePoint integration site column creation September 12, 2024
Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An...Read More -
CVE-2024-45851 Eval on query parameters allows arbitrary code execution in SharePoint integration list item creation September 12, 2024
Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An...Read More -
MindsDB
Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An...Read More
-
CVE-2024-45853 Pickle Load on inhouse BYOM model prediction leads to arbitrary code execution September 12, 2024
Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An...Read More -
CVE-2024-45854 Pickle Load on inhouse BYOM model describe query leads to arbitrary code execution September 12, 2024
Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An...Read More -
CVE-2024-45855 Pickle Load on inhouse BYOM model finetune leads to arbitrary code execution September 12, 2024
Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An...Read More -
MindsDB
Eval on query parameters allows arbitrary code execution in Weaviate integration CVE Number CVE-2024-45846 Summary An...Read More
August 2024
-
SAI-ADV-2024-002 Exec on untrusted LLM output leading to arbitrary code execution on Evaporate integration August 30, 2024
Exec on untrusted LLM output leading to arbitrary code execution on Evaporate integration SAI Advisory Reference...Read More -
SAI-ADV-2024-003 Exec on untrusted LLM output leading to arbitrary code execution on Evaporate integration August 12, 2024
Exec on untrusted LLM output leading to arbitrary code execution on Evaporate integration SAI Advisory Reference...Read More
July 2024
-
Wyze Cam V4
Crafted WiFI network name (SSID) leads to arbitrary command injection CVE Number CVE-2024-37066 Summary The net_service_thread function in libwyzeUtilsPlatform.so spawns...Read More
-
Tensorflow Probability
Deserialization of untrusted data leading to arbitrary code execution SAI Advisory Reference Number SAI-ADV-2024-001 Summary Execution...Read More
June 2024
-
Skops
Model Deserialization Leads to Code Execution CVE Number CVE-2024-37065 Summary When loading nodes of type OperatorFuncNode Skops allows...Read More
-
YData-profiling
Pickle Load in Serialized Profile Load CVE Number CVE-2024-37062 Summary Profile reports can be serialized and...Read More
-
MLflow
Cloudpickle and Pickle Load on Sklearn Model Load Leading to Code Execution CVE Number CVE-2024-37052 CVE-2024-37053...Read More
-
MLflow
Cloudpickle and Pickle Load on Sklearn Model Load Leading to Code Execution CVE Number CVE-2024-37052 CVE-2024-37053...Read More
-
MLflow
Cloudpickle and Pickle Load on Sklearn Model Load Leading to Code Execution CVE Number CVE-2024-37052 CVE-2024-37053...Read More
-
MLflow
Cloudpickle and Pickle Load on Sklearn Model Load Leading to Code Execution CVE Number CVE-2024-37052 CVE-2024-37053...Read More
-
MLflow
Cloudpickle and Pickle Load on Sklearn Model Load Leading to Code Execution CVE Number CVE-2024-37052 CVE-2024-37053...Read More
-
CVE-2024-37056 Cloudpickle Load on LightGBM SciKit Learn Model Leading to Code Execution June 4, 2024
Cloudpickle and Pickle Load on Sklearn Model Load Leading to Code Execution CVE Number CVE-2024-37052 CVE-2024-37053...Read More -
MLflow
Cloudpickle and Pickle Load on Sklearn Model Load Leading to Code Execution CVE Number CVE-2024-37052 CVE-2024-37053...Read More
-
MLflow
Cloudpickle and Pickle Load on Sklearn Model Load Leading to Code Execution CVE Number CVE-2024-37052 CVE-2024-37053...Read More
-
MLflow
Cloudpickle and Pickle Load on Sklearn Model Load Leading to Code Execution CVE Number CVE-2024-37052 CVE-2024-37053...Read More
-
MLflow
Cloudpickle and Pickle Load on Sklearn Model Load Leading to Code Execution CVE Number CVE-2024-37052 CVE-2024-37053...Read More
-
YData-profiling
Pickle Load in Serialized Profile Load CVE Number CVE-2024-37062 Summary Profile reports can be serialized and...Read More
-
YData-profiling
Pickle Load in Serialized Profile Load CVE Number CVE-2024-37062 Summary Profile reports can be serialized and...Read More
April 2024
-
AWS Sagemaker
CVE Number CVE-2024-34072 Summary A deserialization vulnerability exists inside of the NumpyDeserializer.deserialize function of the base_deserializers python file. The deserializer...Read More
-
CVE-2024-34072 Numpy defaults to allowing Pickle to be run when content type is NPY or NPZ April 30, 2024
CVE Number CVE-2024-34072 Summary A deserialization vulnerability exists inside of the NumpyDeserializer.deserialize function of the base_deserializers python file. The deserializer...Read More -
R
RSummary HiddenLayer researchers have discovered a vulnerability, CVE-2024-27322, in the R programming language that allows for...Read More
February 2024
-
ONNX
Path sanitization bypass leading to arbitrary read CVE Number CVE-2024-27318 Summary A path traversal vulnerability exists...Read More
-
CVE-2024-27318 Path sanitization bypass leading to arbitrary read February 23, 2024
Path sanitization bypass leading to arbitrary read CVE Number CVE-2024-27318 Summary A path traversal vulnerability exists...Read More -
ClearML
Following responsible disclosure practices, the vulnerabilities referenced in this blog were disclosed to ClearML before publishing....Read More
-
CVE-2024-24595 Credentials Stored in Plaintext in MongoDB Instance February 1, 2024
Following responsible disclosure practices, the vulnerabilities referenced in this blog were disclosed to ClearML before publishing....Read More -
CVE-2024-24594 Web Server Renders User HTML Leading to XSS February 1, 2024
Following responsible disclosure practices, the vulnerabilities referenced in this blog were disclosed to ClearML before publishing....Read More -
CVE-2024-24593 Cross-site Request Forgery in ClearML Server February 1, 2024
Following responsible disclosure practices, the vulnerabilities referenced in this blog were disclosed to ClearML before publishing....Read More -
CVE-2024-24592 Improper Auth Leading to Arbitrary Read-Write Access February 1, 2024
Following responsible disclosure practices, the vulnerabilities referenced in this blog were disclosed to ClearML before publishing....Read More -
CVE-2024-24590 Pickle Load on Artifact Get Leading to Code Execution February 1, 2024
Following responsible disclosure practices, the vulnerabilities referenced in this blog were disclosed to ClearML before publishing....Read More