CVE-2025-54952

9.8 CRITICAL

📋 TL;DR

An integer overflow vulnerability in ExecuTorch model loading causes insufficient memory allocation, potentially leading to heap corruption and arbitrary code execution. This affects all systems using ExecuTorch before commit 8f062d3f661e20bb19b24b767b9a9a46e8359f2b. Attackers can exploit this by providing malicious models.

💻 Affected Systems

Products:
  • ExecuTorch
Versions: All versions prior to commit 8f062d3f661e20bb19b24b767b9a9a46e8359f2b
Operating Systems: All platforms running ExecuTorch
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when loading ExecuTorch models; systems not using ExecuTorch are unaffected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the ExecuTorch process, potentially leading to full system compromise.

🟠

Likely Case

Application crash (denial of service) or limited code execution within the process context.

🟢

If Mitigated

No impact if patched or if untrusted models are not loaded.

🌐 Internet-Facing: HIGH if models can be uploaded or loaded from external sources.
🏢 Internal Only: MEDIUM if only trusted internal models are used, but risk remains from supply chain attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting a malicious model file; no public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 8f062d3f661e20bb19b24b767b9a9a46e8359f2b or later

Vendor Advisory: https://www.facebook.com/security/advisories/cve-2025-54952

Restart Required: Yes

Instructions:

1. Update ExecuTorch to commit 8f062d3f661e20bb19b24b767b9a9a46e8359f2b or later. 2. Rebuild any applications using ExecuTorch. 3. Restart affected services.

🔧 Temporary Workarounds

Restrict model sources

all

Only load ExecuTorch models from trusted, verified sources to prevent malicious input.

Disable model loading

all

If ExecuTorch model loading is not required, disable this functionality in the application.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for model files.
  • Run ExecuTorch in a sandboxed or containerized environment with minimal privileges.

🔍 How to Verify

Check if Vulnerable:

Check the ExecuTorch version or commit hash; if before 8f062d3f661e20bb19b24b767b9a9a46e8359f2b, it is vulnerable.

Check Version:

Check the commit hash in your ExecuTorch installation directory or build logs.

Verify Fix Applied:

Confirm the ExecuTorch version is at commit 8f062d3f661e20bb19b24b767b9a9a46e8359f2b or later.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected crashes or memory errors in ExecuTorch processes
  • Log entries indicating failed model loading

Network Indicators:

  • Unusual network traffic to/from systems loading ExecuTorch models

SIEM Query:

Search for process crashes or errors related to ExecuTorch or model loading in application logs.

🔗 References

📤 Share & Export