The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-4538

CVE-2026-4538: PyTorch Deserialization Vulnerability

CVE-2026-4538 is a deserialization flaw in PyTorch 2.10.0's pt2 Loading Handler that can be exploited locally. This post explains its technical details, affected versions, impact, and mitigation strategies.

Published: March 27, 2026

CVE-2026-4538 Overview

A deserialization vulnerability has been identified in PyTorch 2.10.0 affecting the pt2 Loading Handler component. The vulnerability allows local attackers to exploit improper deserialization within an unknown function of the pt2 Loading Handler. While the attack requires local access, an exploit has been publicly disclosed through a pull request to the PyTorch project. The PyTorch project was notified of this issue early but has not yet responded.

Critical Impact

Local attackers with low privileges can exploit insecure deserialization in the pt2 Loading Handler, potentially leading to code execution or data compromise within PyTorch machine learning environments.

Affected Products

  • PyTorch 2.10.0
  • PyTorch pt2 Loading Handler component

Discovery Timeline

  • 2026-03-22 - CVE-2026-4538 published to NVD
  • 2026-03-23 - Last updated in NVD database

Technical Details for CVE-2026-4538

Vulnerability Analysis

This vulnerability stems from insecure deserialization within PyTorch's pt2 Loading Handler component. The pt2 format is used by PyTorch 2.x for storing compiled model artifacts, and the loading mechanism processes serialized data that can be manipulated by attackers with local access. The deserialization flaw allows malicious actors to craft specially constructed pt2 files that, when loaded, can execute arbitrary operations beyond the intended model loading functionality.

The vulnerability is classified under CWE-20 (Improper Input Validation), indicating that the pt2 Loading Handler does not adequately validate or sanitize input data before deserializing it. This oversight creates an attack surface where untrusted serialized objects can be processed, potentially leading to unauthorized code execution or data manipulation.

Root Cause

The root cause lies in improper input validation during the deserialization process of pt2 model files. The pt2 Loading Handler fails to implement adequate security controls when reconstructing Python objects from serialized data. PyTorch's model loading mechanisms rely on Python's serialization capabilities, which are inherently dangerous when processing untrusted input without proper validation and sandboxing measures.

Attack Vector

The attack requires local access to the target system. An attacker would need to:

  1. Craft a malicious pt2 file containing weaponized serialized data
  2. Place the malicious file in a location where it will be loaded by the PyTorch application
  3. Wait for or trigger the PyTorch application to load the compromised pt2 file

When the victim's PyTorch application deserializes the malicious pt2 file, the embedded payload is executed. This is a common attack pattern in machine learning environments where models are often downloaded from external sources or shared between teams without adequate verification.

The vulnerability was reported via GitHub Pull Request #176791, and additional details are available through VulDB #352326.

Detection Methods for CVE-2026-4538

Indicators of Compromise

  • Unusual pt2 files appearing in model directories or being loaded from unexpected locations
  • PyTorch processes spawning unexpected child processes or network connections after loading models
  • Anomalous behavior from machine learning applications following model file operations
  • File integrity changes to existing pt2 model files

Detection Strategies

  • Monitor file system activity for creation or modification of pt2 files in production environments
  • Implement application-level logging to track all model loading operations with source file hashes
  • Deploy endpoint detection rules to identify suspicious process chains originating from Python/PyTorch processes
  • Audit model provenance and maintain checksums of trusted pt2 files

Monitoring Recommendations

  • Enable detailed logging for PyTorch model loading operations in development and production environments
  • Implement integrity monitoring for directories containing machine learning model files
  • Configure SentinelOne to alert on behavioral anomalies from Python processes that may indicate deserialization attacks
  • Establish baseline behavior for PyTorch applications and alert on deviations

How to Mitigate CVE-2026-4538

Immediate Actions Required

  • Audit all pt2 model files currently in use and verify their provenance and integrity
  • Restrict file system permissions to prevent unauthorized modification of model directories
  • Implement strict access controls limiting which users can load pt2 model files
  • Consider running PyTorch applications in sandboxed environments or containers with limited privileges

Patch Information

At the time of publication, the PyTorch project has not yet released an official patch for this vulnerability. The issue was reported through GitHub Pull Request #176791, but the project has not responded. Users should monitor the PyTorch GitHub repository for security updates and patch availability.

Workarounds

  • Only load pt2 model files from trusted, verified sources with cryptographic signatures
  • Implement application-level validation of pt2 files before loading, including hash verification
  • Run PyTorch applications under restricted user accounts with minimal system privileges
  • Use containerization to isolate PyTorch workloads and limit the blast radius of potential exploitation
  • Consider disabling pt2 model loading if not required, or implementing a whitelist of approved model files
bash
# Example: Restrict model directory permissions
chmod 750 /path/to/model/directory
chown ml-service:ml-group /path/to/model/directory

# Example: Create integrity check for pt2 files
sha256sum /path/to/trusted/model.pt2 > /path/to/checksums/model.pt2.sha256

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechPytorch

  • SeverityMEDIUM

  • CVSS Score4.8

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-20
  • Technical References
  • GitHub PyTorch Repository

  • GitHub Pull Request #176791

  • VulDB #352326 - CTI

  • VulDB #352326

  • VulDB Submission #774681
  • Related CVEs
  • CVE-2026-24747: PyTorch weights_only RCE Vulnerability

  • CVE-2024-48063: PyTorch RemoteModule RCE Vulnerability

  • CVE-2025-2148: PyTorch Memory Corruption RCE Vulnerability

  • CVE-2024-31580: PyTorch Heap Buffer Overflow DoS Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English