Cyber Posture

CVE-2024-11041

N/APublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
31 July 2025
KEV Added
Patch
CVSS Score N/A
EPSS Score 0.0560 90.4th percentile
Risk Priority 3 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-11041 is a uncategorised-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Vllm Vllm. Its CVSS base score is N/A.

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked in the top 9.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as APIs and Models; in the Supply Chain and Deployment risk domain.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely patching of the unsafe pickle.loads deserialization flaw in vllm's MessageQueue.dequeue(), eliminating the RCE vulnerability.

prevent

Mandates validation of untrusted socket inputs prior to deserialization, blocking malicious pickle payloads from execution.

prevent

Restricts socket inputs to only expected safe formats, preventing processing of malicious deserialization payloads targeting MessageQueue.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

The vulnerability enables remote code execution by sending malicious pickle payloads over sockets to MessageQueue.dequeue(), facilitating exploitation of remote services.

NVD Description

vllm-project vllm version v0.6.2 contains a vulnerability in the MessageQueue.dequeue() API function. The function uses pickle.loads to parse received sockets directly, leading to a remote code execution vulnerability. An attacker can exploit this by sending a malicious payload to the…

more

MessageQueue, causing the victim's machine to execute arbitrary code.

Deeper analysisAI

CVE-2024-11041 affects vllm-project vllm version v0.6.2, specifically the MessageQueue.dequeue() API function. This vulnerability arises from the function's use of pickle.loads to directly parse data received over sockets, enabling deserialization of untrusted input. Classified under CWE-502 (Deserialization of Untrusted Data), it results in a remote code execution (RCE) condition.

An attacker can exploit this vulnerability remotely by sending a malicious pickle payload to the MessageQueue endpoint. If the targeted vllm instance processes the payload via dequeue(), it will execute arbitrary code on the victim's machine, potentially granting full system compromise depending on the host's privileges and environment.

For mitigation details, refer to the advisory on Huntr at https://huntr.com/bounties/00136195-11e0-4ad0-98d5-72db066e867f, which reported the issue.

This vulnerability is notable in the context of AI/ML infrastructure, as vLLM is a high-performance serving engine for large language models, potentially exposing deployments in production LLM inference setups.

Details

CWE(s)

Affected Products

vllm
vllm
0.6.2

AI Security AnalysisAI

AI Category
APIs and Models
Risk Domain
Supply Chain and Deployment
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
vLLM is a high-throughput serving engine for large language models (LLMs), providing APIs for model inference and serving, making it fit the 'APIs and Models' category. The vulnerability is in its MessageQueue API, confirming AI relevance.

CVEs Like This One

CVE-2025-29783Same product: Vllm Vllm
CVE-2025-62164Same product: Vllm Vllm
CVE-2025-24357Same product: Vllm Vllm
CVE-2026-22807Same product: Vllm Vllm
CVE-2025-66448Same product: Vllm Vllm
CVE-2026-22773Same product: Vllm Vllm
CVE-2026-22778Same product: Vllm Vllm
CVE-2026-25960Same product: Vllm Vllm
CVE-2026-27893Same product: Vllm Vllm
CVE-2026-24779Same product: Vllm Vllm

References