CVE-2024-11392

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of Hugging Face Transformers with MobileViTV2. Attackers can exploit this by tricking users into visiting malicious web pages or opening malicious files. The vulnerability affects users who process untrusted configuration files with the affected software.

💻 Affected Systems

Products:
  • Hugging Face Transformers
Versions: Versions prior to the security patch (specific version TBD - check vendor advisory)
Operating Systems: All platforms running Python
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the MobileViTV2 configuration deserialization. Any application using Transformers to process untrusted configuration files is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attacker executes code in user context, potentially stealing credentials, installing malware, or accessing sensitive data processed by the Transformers library.

🟢

If Mitigated

Limited impact with proper network segmentation, least privilege principles, and input validation preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (visiting malicious page or opening malicious file). The vulnerability is in deserialization logic, making exploitation dependent on attacker crafting malicious configuration files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Hugging Face security advisory for specific version

Vendor Advisory: https://huggingface.co/docs/transformers/main/en/security

Restart Required: No

Instructions:

1. Check current Transformers version
2. Update to patched version via pip: pip install --upgrade transformers
3. Verify update completed successfully

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict validation of configuration files before processing with Transformers

Restrict File Sources

all

Only allow configuration files from trusted, verified sources

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems using Transformers
  • Apply strict least privilege principles to user accounts running Transformers

🔍 How to Verify

Check if Vulnerable:

Check if your application uses Hugging Face Transformers and processes configuration files from untrusted sources

Check Version:

python -c "import transformers; print(transformers.__version__)"

Verify Fix Applied:

Verify Transformers version is updated to patched version and test with sample configuration files

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution from Transformers context
  • Suspicious file access patterns
  • Errors in configuration file parsing

Network Indicators:

  • Unusual outbound connections from systems running Transformers

SIEM Query:

Process creation events where parent process is Python and command line contains transformers or related modules

🔗 References

📤 Share & Export