CVE-2024-9053

CRITICAL

Vllm - Insecure Deserialization

Title source: rule

Description

vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.

Scores

CVSS v3 9.8
EPSS 0.0218
EPSS Percentile 84.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-502 CWE-78
Status published

Affected Products (2)

vllm-project/vllm
pypi/vllm PyPI

Timeline

Published Mar 20, 2025
Tracked Since Feb 18, 2026