April 16, 2024, 8:16 p.m. |

CERT Recently Published Vulnerability Notes kb.cert.org

Overview


Lambda Layers in third party TensorFlow-based Keras models allow attackers to inject arbitrary code into versions built prior to Keras 2.13 that may then unsafely run with the same permissions as the running application. For example, an attacker could use this feature to trojanize a popular model, save it, and redistribute it, tainting the supply chain of dependent AI/ML applications.


Description


TensorFlow is a widely-used open-source software library for building machine learning and artificial intelligence applications. The Keras framework, …

application arbitrary code attacker attackers code code injection feature inject injection lambda may party permissions popular run running tensorflow third

More from kb.cert.org / CERT Recently Published Vulnerability Notes

Azure DevSecOps Cloud Engineer II

@ Prudent Technology | McLean, VA, USA

Security Engineer III - Python, AWS

@ JPMorgan Chase & Co. | Bengaluru, Karnataka, India

SOC Analyst (Threat Hunter)

@ NCS | Singapore, Singapore

Managed Services Information Security Manager

@ NTT DATA | Sydney, Australia

Senior Security Engineer (Remote)

@ Mattermost | United Kingdom

Penetration Tester (Part Time & Remote)

@ TestPros | United States - Remote