Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-26210

KTransformers through 0.5.3 contains an unsafe deserialization vulnerability in the balance_serve backend mode where the scheduler RPC server binds a ZMQ ROUTER socket to all interfaces with no authentication and deserializes incoming messages using pickle.loads() without validation. Attackers can send a crafted pickle payload to the exposed ZMQ socket to execute arbitrary code on the server with the privileges of the ktransformers process.

Ver en NVD

Análisis

KTransformers versions up to 0.5.3 are vulnerable to unauthenticated remote code execution when using the balance_serve backend mode. The scheduler RPC server exposes a network socket that deserializes incoming messages without validation, allowing an attacker to execute arbitrary code on the host machine. If you are using this tool for AI model inference, ensure you update or restrict network access to the RPC ports immediately.

Severidad

Puntaje: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-502

EPSS

Probabilidad de explotación (próx. 30 días): 0.0008 (0.1%)
Percentil: 22.3%
EPSS: 2026-05-06

Afecta

kvcache-ai:ktransformers

Descripción técnica

KTransformers through 0.5.3 contains an unsafe deserialization vulnerability in the balance_serve backend mode where the scheduler RPC server binds a ZMQ ROUTER socket to all interfaces with no authentication and deserializes incoming messages using pickle.loads() without validation. Attackers can send a crafted pickle payload to the exposed ZMQ socket to execute arbitrary code on the server with the privileges of the ktransformers process.

Publicada: 23/4/2026, 22:16:26
Última modificación: 5/5/2026, 14:43:28

Referencias

InicioEventosBlogRecursosEquipo