Home » Database

AVID-2026-R1620

Description

Remote Code Execution via Deserialization in modelscope/agentscope (CVE-2024-8502)

Details

A vulnerability in the RpcAgentServerLauncher class of modelscope/agentscope v0.0.6a3 allows for remote code execution (RCE) via deserialization of untrusted data using the dill library. The issue occurs in the AgentServerServicer.create_agent method, where serialized input is deserialized using dill.loads, enabling an attacker to execute arbitrary commands on the server.

Reason for inclusion in AVID: CVE-2024-8502 describes remote code execution via deserialization in the modelscope/agentscope package, a software component used in AI agent frameworks. This is a software supply chain vulnerability affecting a dependency used to build/deploy AI systems, triggering RCE through untrusted data deserialization. It concerns AI models/frameworks/tooling, and has clear security impact (RCE). Therefore it should be kept for AVID curation as an AI software supply chain vulnerability.

References

Affected or Relevant Artifacts

  • Developer: modelscope
  • Deployer: modelscope
  • Artifact Details:
TypeName
Systemmodelscope/agentscope

Impact

AVID Taxonomy Categorization

  • Risk domains: Security
  • SEP subcategories: S0100: Software Vulnerability
  • Lifecycle stages: L06: Deployment

CVSS

Version3.0
Vector StringCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score9.8
Base Severity🔴 Critical
Attack VectorNETWORK
Attack Complexity🟢 Low
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality Impact🔴 High
Integrity Impact🔴 High
Availability Impact🔴 High

CWE

IDDescription
CWE-502CWE-502 Deserialization of Untrusted Data

Other information

  • Report Type: Advisory
  • Credits:
  • Date Reported: 2025-03-20
  • Version: 0.3.3
  • AVID Entry