BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Critical Code Execution Flaws Hit Major AI Engines via ShadowMQ Vulnerability

Critical Remote Code Execution Vulnerabilities Impact Major AI Inference Engines Due to Unsafe ZeroMQ and Python Pickle Usage

  • Critical remote code execution vulnerabilities affect major AI inference engines from Meta, NVIDIA, Microsoft, and open-source projects like vLLM and SGLang.
  • The vulnerabilities originate from unsafe use of ZeroMQ (ZMQ) and Python’s pickle deserialization, a pattern named ShadowMQ due to code reuse across projects.
  • Several security flaws were traced to Meta’s Llama framework (CVE-2024-50050), with similar issues in NVIDIA TensorRT-LLM, Microsoft Sarathi-Serve, Modular Max Server, vLLM, and SGLang.
  • Exploitation can enable attackers to execute arbitrary code, escalate privileges, steal models, and deploy Malware such as cryptocurrency miners across AI clusters.
  • Separate research revealed that Cursor’s AI-powered source code editor is vulnerable to JavaScript injection attacks via rogue MCP servers and malicious extensions, risking credential theft and system compromise.

Security researchers have identified critical remote code execution vulnerabilities impacting key Artificial Intelligence (AI) inference engines used by major technology firms. Flaws have been found in frameworks developed by Meta, Nvidia, Microsoft, and open-source projects including vLLM and SGLang. These issues stem from unsafe deserialization practices involving ZeroMQ (ZMQ) communication combined with Python’s pickle module.

- Advertisement -

The root cause, as detailed by Oligo Security researcher Avi Lumelsky in a recent report, has been termed the ShadowMQ pattern. This pattern describes the repeated unsafe use of pickle deserialization on unauthenticated ZMQ TCP sockets due to widespread code reuse among AI projects.

The initial vulnerability was found in Meta’s Llama large language model framework (CVE-2024-50050, CVSS score: 6.3/9.3) and patched last October. It involved the ZeroMQ recv_pyobj() method deserializing network data without proper security checks, allowing attackers to execute arbitrary code remotely. The pyzmq library has also received fixes addressing this weakness.

Further investigation revealed the same unsafe pattern in NVIDIA TensorRT-LLM (CVE-2025-23254, CVSS 8.8), Modular Max Server (CVE-2025-60455), Microsoft’s Sarathi-Serve, as well as open-source vLLM and SGLang projects. Some of these issues remain unpatched or only partially resolved. Code reuse through direct copying of vulnerable logic contributed to the spread of this flaw across multiple codebases.

Compromising a single AI inference engine node could enable attackers to execute code on clusters, escalate privileges, steal AI models, or deploy malicious payloads like cryptocurrency miners for financial gain. Lumelsky emphasized the rapid pace of AI development and the dangers of reusing unsafe architectural components.

- Advertisement -

In related developments, security research by Knostic has exposed vulnerabilities in Cursor’s AI-enabled source code editor. Attackers can exploit rogue local Model Context Protocol (MCP) servers to replace browser login pages with fake versions, capturing user credentials. Additionally, malicious IDE extensions can inject JavaScript to perform arbitrary actions with the editor’s full privileges, including file system access and persisting malware. Guidance to mitigate these risks includes disabling auto-run features, carefully vetting extensions and MCP servers, limiting API permissions, and auditing critical integrations.

References to the specific vulnerabilities and their fixes are available through these links:

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Strategy to Resume Bitcoin Purchases Amid Dividend Plans

Strategy signaled it will resume its Bitcoin purchases this week, having paused them ahead...

Firms roll out quantum-proof wallets ahead of blockchain upgrades

Cryptocurrency firms are deploying quantum-resistant wallets ahead of core blockchain protocol upgrades, fearing "Q-Day"...

Bitcoin reclaims market cap lead over Tesla

Bitcoin's market cap of $1.62 trillion has narrowly overtaken Tesla's $1.608 trillion, making it...

Bitcoin Eyes $81K as Traders Brace for Sub-$80K Retest

Bitcoin traders anticipate a pullback to retest the $80,000 support level and the bull...

AI Models Play “Survivor” in Stanford Game Benchmark

A Stanford researcher created an AI "Survivor" game called Agent Island to test how...

Must Read

How To Buy a Handshake Domain: A Step-by-Step Guide

Handshake Domains | Benefits | Drawbacks | How To Buy | Supported BrowsersIn this step-by-step guide, I am going to show you how to...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading