Skip to main content
Mallory

Critical Deserialization Vulnerabilities in AI and Analytics Frameworks

ai-platform-securitywidely-deployed-product-advisoryopen-source-dependency-vulnerability
Updated March 21, 2026 at 03:06 PM3 sources
Share:
Critical Deserialization Vulnerabilities in AI and Analytics Frameworks

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Multiple high-severity deserialization vulnerabilities have been identified in widely used AI and analytics frameworks, including NVIDIA Isaac Lab, MooreThreads torch_musa, and NVIDIA Merlin components. These flaws allow attackers to exploit unsafe deserialization processes, potentially leading to remote code execution or denial-of-service conditions on affected systems. In the case of MooreThreads torch_musa, the vulnerability arises from the use of pickle.load() on user-controlled files without validation, enabling arbitrary code execution with the privileges of the victim process. Similarly, NVIDIA Isaac Lab and Merlin frameworks are affected by deserialization issues that could be exploited remotely, with Merlin's NVTabular and Transformers4Rec components specifically highlighted for their susceptibility to code execution and data tampering attacks.

Security advisories urge immediate patching, as these vulnerabilities are remotely exploitable and pose significant risks to enterprise environments. The affected products span various versions, and organizations using these frameworks are advised to review vendor guidance and apply available security updates to mitigate the threat. The vulnerabilities have been assigned high or critical CVSS scores, underscoring the urgency for remediation to prevent potential exploitation in production environments.

Timeline

  1. Dec 16, 2025

    NVIDIA discloses critical Isaac Lab deserialization vulnerability

    NVIDIA's PSIRT disclosed CVE-2025-33210, a critical deserialization vulnerability in NVIDIA Isaac Lab with potential for remote code execution. The issue was confirmed to affect Isaac Lab and prompted guidance to update to the latest version and apply available security patches.

  2. Dec 15, 2025

    Public PoC exploit reported for MooreThreads torch_musa vulnerability

    Proof-of-concept exploit code for CVE-2025-65213 was reported as publicly available on GitHub, increasing the likelihood of exploitation in the wild. The PoC relates to unsafe use of pickle.load() on user-controlled file paths in torch_musa.

  3. Dec 15, 2025

    CVE-2025-65213 published for MooreThreads torch_musa RCE flaw

    A critical deserialization vulnerability, CVE-2025-65213, was published for all versions of MooreThreads torch_musa, affecting functions in the torch_musa.utils.compare_tool module that use unsafe pickle deserialization. The issue can be exploited remotely without privileges or user interaction to achieve arbitrary code execution.

  4. Dec 15, 2025

    NVIDIA patches two high-severity Merlin deserialization flaws

    NVIDIA released security patches for its Merlin framework to fix CVE-2025-33214 and CVE-2025-33213, two high-severity deserialization vulnerabilities affecting the NVTabular Workflow and Transformers4Rec Trainer components on Linux. The flaws could allow arbitrary code execution, denial of service, sensitive information disclosure, and data tampering.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Critical Code Execution Vulnerability in NVIDIA Isaac Lab AI Framework

Critical Code Execution Vulnerability in NVIDIA Isaac Lab AI Framework

A critical deserialization vulnerability (CVE-2025-32210) was discovered in NVIDIA Isaac Lab, a component of the NVIDIA Isaac Sim framework, allowing attackers with low privileges and minimal user interaction to execute arbitrary code on affected systems. The flaw, categorized as CWE-502, affects all versions of Isaac Lab prior to v2.3.0 and carries a CVSS score of 9.0, indicating a high risk to confidentiality, integrity, and availability. NVIDIA responded by releasing a security update that implements proper input validation and secure data handling, urging all users to upgrade to Isaac Lab v2.3.0 immediately to mitigate the risk of exploitation. The vulnerability also prompted broader advisories regarding critical security patches for NVIDIA's AI platforms, including both Isaac Lab and the NeMo Framework, due to the risk of full code execution if left unpatched. Organizations using these AI tools are strongly advised to verify their deployments and apply the latest security updates across all environments. The urgency of the patch is underscored by the potential for attackers to achieve complete system compromise through network-based attacks requiring only low-level access and user interaction.

1 months ago
NVIDIA BioNeMo and FLARE SDK Hit by High-Severity Deserialization Flaws

NVIDIA BioNeMo and FLARE SDK Hit by High-Severity Deserialization Flaws

NVIDIA disclosed two high-severity deserialization vulnerabilities affecting **BioNeMo** and the **FLARE SDK**, both tracked under `CWE-502` and capable of compromising confidentiality, integrity, and availability. `CVE-2026-24164` impacts BioNeMo and could allow code execution, denial of service, information disclosure, and data tampering through deserialization of untrusted data. The flaw carries a `CVSS:3.1` vector of `AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`, indicating remote attack potential with low complexity and high impact. A second flaw, `CVE-2026-24186`, affects the NVIDIA FLARE SDK in **FOBS** handling, where a malicious FOBS-encoded message can trigger unsafe deserialization and lead to code execution. That issue was scored `CVSS:3.1 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H`, reflecting similarly severe impact with no user interaction required. NVIDIA advisory material, NVD entries, and official CVE records were published for both vulnerabilities, signaling that organizations using either platform should review vendor guidance and prioritize remediation.

4 days ago
Critical Vulnerabilities in NVIDIA Isaac Launchable Allow Remote Code Execution and Privilege Escalation

Critical Vulnerabilities in NVIDIA Isaac Launchable Allow Remote Code Execution and Privilege Escalation

NVIDIA has disclosed multiple critical vulnerabilities in its Isaac Launchable product, each carrying a CVSS v3.1 base score of 9.8, indicating a severe risk to affected systems. The vulnerabilities include two privilege escalation flaws (CVE-2025-33223 and CVE-2025-33224) that allow attackers to execute code with unnecessary privileges, potentially leading to code execution, escalation of privileges, denial of service, information disclosure, and data tampering. Additionally, a hard-coded credential vulnerability (CVE-2025-33222) could be exploited to achieve similar impacts, including unauthorized access and manipulation of system data. All vulnerabilities are remotely exploitable and require immediate attention. NVIDIA has released security updates to address these issues and strongly recommends that users download and install the latest version of Isaac Launchable to mitigate the risks. The official security bulletin provides detailed descriptions of each CVE, their associated CWE categories, and the potential impacts. Organizations using NVIDIA Isaac Launchable should prioritize patching to prevent exploitation, as the vulnerabilities could be leveraged by remote attackers without user interaction or prior authentication.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.