CVE-2024-10190:
Horovod Vulnerable to Command Injection
9.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.67502%
CWE
Published
3/20/2025
Updated
3/20/2025
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
horovod | pip |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems directly from the _put_value method in ElasticRendezvousHandler handling user-controlled data through insecure deserialization. The method calls codec.loads_base64(value) which decodes and deserializes untrusted input via cloudpickle.loads(), a known unsafe practice for untrusted data. This function is explicitly referenced in all vulnerability descriptions as the attack entry point.