Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-34997

CVE-2024-34997: Joblib Deserialization Vulnerability

CVE-2024-34997 is a deserialization flaw in Joblib v1.4.2 affecting the NumpyArrayWrapper component. This vulnerability poses risks during untrusted data handling. This post covers technical details, impact, and mitigation.

Updated: January 22, 2026

CVE-2024-34997 Overview

CVE-2024-34997 is a deserialization vulnerability discovered in joblib version 1.4.2, a Python library widely used for lightweight pipelining and caching of function results. The vulnerability exists within the joblib.numpy_pickle::NumpyArrayWrapper().read_array() component, which could potentially allow an attacker to execute arbitrary code through maliciously crafted serialized data.

Note: This vulnerability is disputed by the supplier because NumpyArrayWrapper is only used during caching of trusted content. However, organizations should evaluate their risk based on how joblib is used within their environments.

Critical Impact

Insecure deserialization in joblib could allow remote code execution if an attacker can supply malicious cached data to a target system using the vulnerable NumpyArrayWrapper().read_array() function.

Affected Products

  • joblib version 1.4.2 (Python package)
  • Applications and machine learning pipelines utilizing joblib for caching
  • Systems loading untrusted or externally-sourced cached pickle files

Discovery Timeline

  • 2024-05-17 - CVE-2024-34997 published to NVD
  • 2025-09-29 - Last updated in NVD database

Technical Details for CVE-2024-34997

Vulnerability Analysis

This vulnerability falls under CWE-502 (Deserialization of Untrusted Data), a well-known class of security weaknesses that can lead to severe consequences including remote code execution. The vulnerability is located in the NumpyArrayWrapper().read_array() method within joblib's numpy pickle handling code.

The attack requires network access with low privileges and high complexity to exploit. If successful, an attacker could achieve complete compromise of confidentiality, integrity, and availability of the target system. The primary concern is that deserialization vulnerabilities in Python pickle-based systems can be weaponized to instantiate arbitrary objects and execute code during the unpickling process.

The supplier disputes this CVE, arguing that NumpyArrayWrapper is specifically designed for internal caching operations where the cached content is inherently trusted. However, security researchers have raised concerns about scenarios where cached data might originate from untrusted sources or could be tampered with by an adversary.

Root Cause

The root cause is the inherent insecurity of Python's pickle serialization mechanism when handling untrusted data. The NumpyArrayWrapper class deserializes NumPy array data from cached files, and if an attacker can inject a malicious pickle payload into a cache file that is subsequently read by the vulnerable function, arbitrary code execution may be possible.

Python's pickle module documentation explicitly warns that "pickle is not secure. Only unpickle data you trust." The vulnerability arises when this fundamental assumption is violated—particularly in environments where cached data may be modified by external actors or loaded from untrusted network locations.

Attack Vector

The attack vector for this vulnerability is network-based, though exploitation complexity is high. An attacker would need to:

  1. Identify a target application using joblib for caching operations
  2. Gain the ability to inject or modify cached pickle files (e.g., through a shared cache directory, network file system, or by compromising a cache storage mechanism)
  3. Craft a malicious pickle payload that triggers code execution when deserialized by NumpyArrayWrapper().read_array()
  4. Wait for or trigger the victim application to load the poisoned cache file

The exploitation mechanism leverages Python's __reduce__ method or similar pickle gadgets to execute arbitrary commands during deserialization. Technical details and discussion can be found in GitHub Issue #1582 and GitHub Issue #977.

Detection Methods for CVE-2024-34997

Indicators of Compromise

  • Unexpected modifications to joblib cache files or directories
  • Anomalous process spawning from Python applications using joblib
  • Suspicious network connections initiated by cached function execution
  • Unusual file system access patterns in cache directories

Detection Strategies

  • Monitor for file integrity changes in joblib cache directories
  • Implement runtime application self-protection (RASP) to detect deserialization attacks
  • Deploy endpoint detection rules for pickle-based exploitation patterns
  • Audit Python applications for joblib usage with externally-sourced cache files

Monitoring Recommendations

  • Enable detailed logging for applications utilizing joblib caching functionality
  • Monitor for unexpected subprocess creation from Python processes
  • Implement file integrity monitoring on cache storage locations
  • Review access controls on shared cache directories and network file systems

How to Mitigate CVE-2024-34997

Immediate Actions Required

  • Audit all applications using joblib to determine if cache files could originate from untrusted sources
  • Ensure joblib cache directories have restrictive file system permissions
  • Avoid loading cached data from network locations or shared directories accessible to untrusted parties
  • Consider implementing cache file integrity verification mechanisms

Patch Information

As of the last update, the vulnerability remains disputed by the vendor. The supplier's position is that NumpyArrayWrapper is designed for trusted content caching scenarios. Organizations should monitor GitHub Issue #1582 for any updates or patches that may address this concern.

For environments where untrusted cache data is a risk, consider architectural changes to ensure all cached content originates from trusted sources only.

Workarounds

  • Restrict cache storage to local directories with strict file permissions (mode 0700)
  • Implement application-level validation of cache file sources before loading
  • Use signed or encrypted cache files when cache data must traverse untrusted channels
  • Consider alternative caching mechanisms for sensitive applications where cache provenance cannot be guaranteed
bash
# Configuration example - Secure cache directory permissions
chmod 700 /path/to/joblib/cache
chown appuser:appuser /path/to/joblib/cache

# Verify no world-readable or group-writable permissions
ls -la /path/to/joblib/cache

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechJoblib

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.48%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-502
  • Technical References
  • GitHub Issue #1582

  • GitHub Issue #977
  • Latest CVEs
  • CVE-2025-49454: TinySalt Path Traversal Vulnerability

  • CVE-2025-48261: MultiVendorX Information Disclosure Flaw

  • CVE-2025-32119: CardGate WooCommerce SQL Injection Flaw

  • CVE-2025-26879: s2Member Plugin Reflected XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English