Cyber Posture

CVE-2024-9053

CriticalPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
15 October 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1002 93.1th percentile
Risk Priority 26 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2024-9053 is a critical vulnerability in the vllm-project's vllm version 0.6.0, specifically affecting the AsyncEngineRPCServer RPC server entrypoints. The core issue lies in the run_server_loop function, which calls _make_handler_coro that directly invokes cloudpickle.loads on received messages without any sanitization. This unsafe deserialization of untrusted pickle data enables remote code execution. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-502 (Deserialization of Untrusted Data) and CWE-78 (Improper Neutralization of Special Elements used in an OS Command).

Any remote attacker with network access to the vulnerable RPC server can exploit this flaw without authentication, privileges, or user interaction. By crafting and transmitting malicious pickle data, the attacker triggers arbitrary code execution on the server, granting high-impact control over confidentiality, integrity, and availability of the affected system.

Mitigation guidance and additional details are available in the Huntr advisory at https://huntr.com/bounties/75a544f3-34a3-4da0-b5a3-1495cb031e09.

vLLM serves as a high-throughput inference engine for large language models, highlighting the vulnerability's relevance to AI/ML serving environments where RPC endpoints may be exposed.

Details

CWE(s)
CWE-502CWE-78

Affected Products

vllm-project
vllm
0.6.0

AI Security Analysis

AI Category
Other Platforms
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
vLLM is a high-throughput serving engine/platform for large language models (LLMs), fitting under Other Platforms as an AI inference serving framework.

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The unsafe deserialization vulnerability in the vLLM AsyncEngineRPCServer enables remote code execution via malicious pickle data sent to the RPC server entrypoints, directly mapping to exploitation of a public-facing application.

References