CVE-2025-54950
Published: 07 August 2025
Summary
CVE-2025-54950 is a critical-severity Out-of-bounds Read (CWE-125) vulnerability in Facebook (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 45.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely identification, reporting, and correction of flaws, directly addressing this out-of-bounds access vulnerability through patching to the fixed ExecuTorch commit.
Implements memory protections that prevent arbitrary code execution resulting from out-of-bounds access during ExecuTorch model loading.
Requires validation of input information, such as ExecuTorch models, to block specially crafted inputs that trigger out-of-bounds access.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated OOB read in model loader directly enables RCE via crafted input over network (T1190).
NVD Description
An out-of-bounds access vulnerability in the loading of ExecuTorch models can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit b6b7a16df5e7852d976d8c34c8a7e9a1b6f7d005.
Deeper analysisAI
CVE-2025-54950 is an out-of-bounds access vulnerability (CWE-125) in the loading of ExecuTorch models, which can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit b6b7a16df5e7852d976d8c34c8a7e9a1b6f7d005. The vulnerability has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical due to its potential for high impacts on confidentiality, integrity, and availability.
Unauthenticated attackers with network access can exploit this vulnerability with low attack complexity and without requiring user interaction. Exploitation involves providing a specially crafted ExecuTorch model, leading to out-of-bounds access during loading, which may crash the runtime or enable arbitrary code execution on the target system.
Mitigation is addressed by updating to ExecuTorch commit b6b7a16df5e7852d976d8c34c8a7e9a1b6f7d005 or later, as provided in the GitHub commit reference. Further details on the advisory are available at https://www.facebook.com/security/advisories/cve-2025-54950.
Details
- CWE(s)