CVE-2023-43654

CVSS 3.1 Score 10.0 of 10 (high)

Details

Published Sep 28, 2023
Updated: Oct 31, 2023
CWE ID 918

Summary

CVE-2023-43654 is a vulnerability affecting TorchServe, a tool used for serving and scaling PyTorch models in production. The default configuration of TorchServe lacks proper input validation, allowing third parties to make remote HTTP download requests and write files to the disk. This vulnerability could be exploited to compromise the integrity of the system and sensitive data. Versions 0.1.0 to 0.8.1 are affected by this issue, but an upgrade to version 0.8.2 includes a fix for it. Users are advised to upgrade as there are no known workarounds available. The vulnerability has a rating of CRITICAL with a base score of 10.0 and poses a high risk in terms of integrity and confidentiality impact, with potential exploitation via network access. Source: security-advisories@github.com

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-43654 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options