Home » Database

AVID-2026-R1381

Description

Remote Code Execution by Pickle Deserialization in open-mmlab/mmdetection (CVE-2024-12044)

Details

A remote code execution vulnerability exists in open-mmlab/mmdetection version v3.3.0. The vulnerability is due to the use of the pickle.loads() function in the all_reduce_dict() distributed training API without proper sanitization. This allows an attacker to execute arbitrary code by broadcasting a malicious payload to the distributed training network.

Reason for inclusion in AVID: CVE-2024-12044 describes remote code execution via unsafe pickle deserialization in open-mmlab/mmdetection, a widely-used ML computer vision library. This vulnerability affects the AI software stack during distributed training, making it a software supply-chain vulnerability in AI systems. It is a security vulnerability with high impact and is well-supported by the CVE text.

References

Affected or Relevant Artifacts

  • Developer: open-mmlab
  • Deployer: open-mmlab
  • Artifact Details:
TypeName
Systemopen-mmlab/mmdetection

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score9.8
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-502CWE-502 Deserialization of Untrusted Data

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-20
  • Version: 0.3.3
  • AVID Entry