PT-2025-19899 · Zeromq +1 · Zeromq +1
Avioligo
·
Published
2025-05-06
·
Updated
2025-07-31
·
CVE-2025-30165
8.0
High
Base vector | Vector | AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
vLLM versions 0.5.2 through 0.8.5.post1
**Description:**
vLLM is an inference and serving engine for large language models. In a multi-node deployment using the V0 engine, vLLM utilizes ZeroMQ for communication. Secondary vLLM hosts open a `SUB` ZeroMQ socket and connect to an `XPUB` socket on the primary host. Data received on the `SUB` socket is deserialized using `pickle`, which is unsafe and can allow for remote code execution. This vulnerability can serve as an escalation point, potentially compromising the entire vLLM deployment if the primary host is compromised. Attackers may also exploit this vulnerability without direct access to the primary host, for example, through ARP cache poisoning to redirect traffic to a malicious endpoint delivering arbitrary code.
**Recommendations:**
vLLM versions 0.5.2 through 0.8.5.post1: Ensure your environment is on a secure network if using a multi-node deployment with the V0 engine and tensor parallelism.
Fix
RCE
Deserialization of Untrusted Data
Weakness Enumeration
Related Identifiers
Affected Products
References · 13
- https://github.com/vllm-project/vllm/security/advisories/GHSA-9pcc-gvx5-r5wm⭐ 53656 🔗 9052 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-9pcc-gvx5-r5wm · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-30165 · Security Note
- https://github.com/vllm-project/vllm⭐ 49770 🔗 8013 · Note
- https://github.com/vllm-project/vllm/blob/c21b99b91241409c2fdf9f3f8c542e8748b317be/vllm/distributed/device_communicators/shm_broadcast.py#L295-L301⭐ 46678 🔗 7261 · Note
- https://github.com/vllm-project/vllm/blob/c21b99b91241409c2fdf9f3f8c542e8748b317be/vllm/distributed/device_communicators/shm_broadcast.py#L468-L470⭐ 46678 🔗 7261 · Note
- https://twitter.com/cybercronai/status/1920135428587356566 · Twitter Post
- https://t.me/latest_high_impact_cve/2291 · Telegram Post
- https://t.me/cveNotify/130442 · Telegram Post
- https://t.me/cvetracker/23193 · Telegram Post
- https://t.me/cvedetector/24625 · Telegram Post
- https://twitter.com/cybercronai/status/1920252981959700530 · Twitter Post
- https://twitter.com/CVEnew/status/1919802965256175839 · Twitter Post