The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-11392

CVE-2024-11392: Huggingface Transformers RCE Vulnerability

CVE-2024-11392 is a deserialization RCE flaw in Huggingface Transformers MobileViTV2 that enables attackers to execute arbitrary code. This article covers the technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2024-11392 Overview

CVE-2024-11392 is an insecure deserialization vulnerability in Hugging Face Transformers that allows remote attackers to execute arbitrary code on affected installations. The vulnerability exists within the MobileViTV2 model's handling of configuration files, where improper validation of user-supplied data enables deserialization of untrusted data. User interaction is required to exploit this vulnerability—the target must visit a malicious page or open a malicious file. This vulnerability was tracked as ZDI-CAN-24322.

Critical Impact

Successful exploitation allows remote code execution in the context of the current user, potentially leading to complete system compromise, data theft, or lateral movement within an organization's infrastructure.

Affected Products

  • Hugging Face Transformers (all versions prior to fix)

Discovery Timeline

  • 2024-11-22 - CVE-2024-11392 published to NVD
  • 2025-02-10 - Last updated in NVD database

Technical Details for CVE-2024-11392

Vulnerability Analysis

This vulnerability belongs to the CWE-502 (Deserialization of Untrusted Data) category and affects the MobileViTV2 component of Hugging Face Transformers. The flaw stems from the library's handling of model configuration files, which fails to properly validate user-supplied data before deserialization. When a user loads a maliciously crafted model or configuration file, the attacker-controlled serialized data is processed without adequate security checks, enabling arbitrary code execution.

The attack requires user interaction—either visiting a malicious web page or opening a malicious file—making it a targeted attack vector. Once exploited, the attacker gains code execution privileges equivalent to the current user, which in many machine learning environments may have access to sensitive training data, model weights, and cloud credentials.

Root Cause

The root cause of this vulnerability is the lack of proper validation and sanitization of user-supplied data within configuration file handlers. The MobileViTV2 model implementation deserializes configuration data without verifying its integrity or origin, allowing attackers to inject malicious serialized objects. This is a common pattern in Python-based machine learning frameworks where pickle or similar serialization formats are used without security hardening.

Attack Vector

The attack vector is network-based and requires user interaction. An attacker can craft a malicious model repository, configuration file, or web page that, when accessed by a victim using Hugging Face Transformers, triggers the deserialization vulnerability. The attack flow typically involves:

  1. Attacker creates a malicious model or configuration file containing a serialized payload
  2. Victim is social engineered into loading the malicious resource (via a fake model repository, phishing email, or compromised website)
  3. Upon loading, the Transformers library deserializes the attacker's payload
  4. Arbitrary code executes in the context of the victim's user account

The vulnerability is particularly dangerous in environments where users frequently download and experiment with community-contributed models from platforms like the Hugging Face Hub.

Detection Methods for CVE-2024-11392

Indicators of Compromise

  • Unexpected network connections originating from Python processes running Transformers workloads
  • Anomalous process spawning from Python interpreters loading ML models
  • Unauthorized file system access or modifications following model loading operations
  • Suspicious model configuration files containing obfuscated or encoded data

Detection Strategies

  • Monitor for unusual deserialization activities in Python environments, particularly involving pickle, torch.load(), or similar serialization libraries
  • Implement file integrity monitoring on model directories and configuration files
  • Deploy endpoint detection and response (EDR) solutions to detect post-exploitation behaviors such as command execution or lateral movement
  • Audit model loading operations and flag configurations from untrusted sources

Monitoring Recommendations

  • Enable verbose logging for Hugging Face Transformers operations to capture model loading events
  • Monitor outbound network traffic from machine learning workloads for unexpected connections
  • Implement behavioral analysis for Python processes to detect anomalous execution patterns
  • Set up alerts for new or modified files in model cache directories (~/.cache/huggingface/)

How to Mitigate CVE-2024-11392

Immediate Actions Required

  • Only load models from trusted, verified sources on the Hugging Face Hub
  • Audit and remove any untrusted or unverified models from your environment
  • Implement network segmentation for machine learning workloads to limit blast radius
  • Review access controls for systems running Transformers workloads
  • Consider running model loading operations in sandboxed or containerized environments

Patch Information

Refer to the Zero Day Initiative Advisory ZDI-24-1513 for the latest patch information and vendor response. Users should update to the latest version of Hugging Face Transformers once a fix is available and monitor the official Hugging Face security channels for updates.

Workarounds

  • Avoid loading models or configuration files from untrusted or unverified sources
  • Implement strict allowlisting for permitted model repositories and sources
  • Run Transformers workloads in isolated environments with limited privileges
  • Use containerization with restricted capabilities to limit the impact of potential exploitation
  • Disable automatic model downloading in production environments and manually verify models before deployment
bash
# Configuration example: Running Transformers in a restricted container
docker run --rm -it \
  --read-only \
  --security-opt=no-new-privileges:true \
  --cap-drop=ALL \
  --network=none \
  -v /path/to/verified/models:/models:ro \
  your-ml-container python your_script.py

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechHuggingface Transformers

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability30.77%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-502
  • Technical References
  • Zero Day Initiative Advisory ZDI-24-1513
  • Related CVEs
  • CVE-2024-11393: Hugging Face Transformers RCE Vulnerability

  • CVE-2024-11394: Hugging Face Transformers RCE Vulnerability

  • CVE-2025-2099: Huggingface Transformers ReDoS Vulnerability

  • CVE-2023-7018: Huggingface Transformers Deserialization Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English