The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-30165

CVE-2025-30165: Vllm Engine RCE Vulnerability

CVE-2025-30165 is a remote code execution flaw in Vllm's V0 engine that exploits unsafe pickle deserialization in multi-node deployments. This article covers the technical details, affected configurations, and mitigation.

Updated: January 22, 2026

CVE-2025-30165 Overview

CVE-2025-30165 is an insecure deserialization vulnerability affecting vLLM, a popular inference and serving engine for large language models. In multi-node vLLM deployments using the V0 engine, the system utilizes ZeroMQ for inter-node communication. Secondary vLLM hosts connect to the primary host using a SUB ZeroMQ socket, and data received on this socket is deserialized using Python's pickle module. This unsafe deserialization practice can be exploited to execute arbitrary code on remote machines within the vLLM deployment cluster.

Critical Impact

Attackers who compromise the primary vLLM host can leverage this vulnerability to execute arbitrary code on all secondary nodes in the deployment. Alternative attack vectors such as ARP cache poisoning can also be used to redirect traffic and deliver malicious payloads without direct access to the primary host.

Affected Products

  • vLLM (versions using V0 engine with multi-node tensor parallelism)
  • vLLM deployments prior to v0.8.0 (V0 engine enabled by default)
  • Multi-node vLLM deployments using tensor parallelism across multiple hosts

Discovery Timeline

  • May 6, 2025 - CVE-2025-30165 published to NVD
  • July 31, 2025 - Last updated in NVD database

Technical Details for CVE-2025-30165

Vulnerability Analysis

This vulnerability stems from the use of Python's pickle module for deserializing data in inter-node communications within vLLM's distributed architecture. The pickle module is inherently unsafe for deserializing untrusted data because it can execute arbitrary Python code during the deserialization process. When secondary vLLM nodes receive data from what they believe is the primary host, they blindly deserialize it using pickle, creating a critical code execution pathway.

The vulnerability is particularly concerning in distributed AI infrastructure where multiple GPU nodes work together for tensor parallelism. While the attack requires adjacent network access (the attacker must be on the same network segment as the vLLM deployment), the potential for lateral movement across an entire AI compute cluster makes this a significant security risk.

The vLLM maintainers have explicitly chosen not to patch this vulnerability due to its invasive nature and the fact that V0 has been off by default since version 0.8.0. Instead, they recommend network-level mitigations for deployments still using the affected configuration.

Root Cause

The root cause of CVE-2025-30165 is the unsafe use of Python's pickle deserialization on data received from network sockets without proper validation or sanitization. The vulnerable code exists in the shm_broadcast.py module, specifically in the ZeroMQ subscriber implementation that handles inter-node communication. When the secondary nodes connect to the primary host's XPUB socket and receive messages on their SUB socket, the received data is passed directly to pickle.loads() without any integrity verification or origin authentication.

Attack Vector

The attack can be executed through two primary vectors:

  1. Primary Host Compromise: An attacker who gains control of the primary vLLM host can send malicious pickled payloads to all secondary nodes in the cluster. The secondary nodes will deserialize these payloads and execute the embedded malicious code, effectively allowing the attacker to compromise the entire vLLM deployment from a single point of entry.

  2. Network-Level Attack: Without access to the primary host, an attacker on the same network segment can use techniques such as ARP cache poisoning to intercept and redirect ZeroMQ traffic. By impersonating the primary host, the attacker can inject malicious pickled payloads that secondary nodes will execute.

The vulnerability exists in the client-side code (secondary nodes), making it an escalation point that allows an attacker to move laterally through the distributed AI infrastructure.

Detection Methods for CVE-2025-30165

Indicators of Compromise

  • Unexpected network connections to ZeroMQ ports from unauthorized IP addresses
  • ARP table anomalies indicating potential ARP cache poisoning attacks
  • Unusual process execution on vLLM secondary nodes that don't match expected ML workloads
  • Network traffic patterns showing modified or injected ZeroMQ messages

Detection Strategies

  • Monitor for ARP spoofing attacks on networks hosting vLLM deployments
  • Implement network intrusion detection rules for anomalous ZeroMQ traffic patterns
  • Deploy endpoint detection to identify unexpected code execution on vLLM nodes
  • Audit vLLM configuration to identify deployments using V0 engine with multi-node tensor parallelism

Monitoring Recommendations

  • Enable logging of all inter-node ZeroMQ communications in vLLM deployments
  • Implement network segmentation monitoring for vLLM cluster traffic
  • Deploy SentinelOne agents on all vLLM nodes for real-time threat detection and response
  • Monitor for process injection and suspicious Python execution patterns on GPU compute nodes

How to Mitigate CVE-2025-30165

Immediate Actions Required

  • Upgrade to vLLM v0.8.0 or later and ensure V1 engine is enabled (default configuration)
  • Audit existing deployments to identify any using V0 engine with multi-node tensor parallelism
  • Implement strict network segmentation to isolate vLLM cluster traffic from untrusted networks
  • Deploy network-level access controls to restrict ZeroMQ port access to authorized nodes only

Patch Information

The vLLM maintainers have decided not to release a patch for this vulnerability due to the invasive nature of the required fix and the fact that the V0 engine has been disabled by default since version 0.8.0. Users are advised to migrate to the V1 engine, which is not affected by this vulnerability. For detailed information, refer to the GitHub Security Advisory.

Workarounds

  • Migrate from V0 to V1 engine if possible (V1 is the default since v0.8.0 and is not affected)
  • Deploy vLLM clusters on isolated, secure network segments with no untrusted access
  • Implement VLANs and firewall rules to prevent ARP spoofing and unauthorized network access
  • Use IPsec or other network-layer encryption for inter-node communications
  • Consider single-node deployments where multi-node tensor parallelism is not strictly required
bash
# Network isolation example - restrict ZeroMQ ports to trusted nodes only
# Example iptables rules for secondary vLLM nodes
iptables -A INPUT -p tcp --dport 5555 -s PRIMARY_HOST_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 5555 -j DROP

# Verify V1 engine is enabled in vLLM configuration
# Set environment variable to explicitly use V1 engine
export VLLM_USE_V1=1

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechVllm

  • SeverityHIGH

  • CVSS Score8.0

  • EPSS Probability0.40%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-502
  • Technical References
  • GitHub Code Snippet

  • GitHub Code Snippet
  • Vendor Resources
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-22778: vLLM ASLR Bypass and RCE Vulnerability

  • CVE-2026-22807: vLLM RCE Vulnerability

  • CVE-2025-62164: Vllm Vllm RCE Vulnerability

  • CVE-2025-66448: Vllm Vllm RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English