{"vulnerability": "CVE-2024-12029", "sightings": [{"uuid": "a7e62ac5-2594-4008-94f4-945b0f761a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12029", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:06.000000Z"}, {"uuid": "d5c2cb17-def4-447f-be99-620b68976909", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12029", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-19T02:34:22.000000Z"}, {"uuid": "7e45c0d2-7b12-4dd8-94e9-934dea8744ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12029", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "ac9d16c4-7e5c-47b2-8451-4d2c79065d31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12029", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3likodpy6go25", "content": "", "creation_timestamp": "2025-02-19T21:02:31.658664Z"}, {"uuid": "4c073ad8-6df6-4567-9222-d5f1dd568707", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12029", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lksmhd4oyc2v", "content": "", "creation_timestamp": "2025-03-20T11:40:27.339433Z"}, {"uuid": "90a71859-616c-49ad-9f32-0024190ac71f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12029", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/invokeai_rce_cve_2024_12029.rb", "content": "", "creation_timestamp": "2025-02-18T13:08:28.000000Z"}, {"uuid": "db343f91-a617-42b0-ad3c-34adf5dbcdd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12029", "type": "seen", "source": "Telegram/yG0q3IpDztUHkWGWcBfSkFN1RblCcRFZP5pQldEwVfp_P8g", "content": "", "creation_timestamp": "2026-04-16T09:00:04.000000Z"}, {"uuid": "704593be-3695-4528-ae1d-d3111b3ea330", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12029", "type": "published-proof-of-concept", "source": "Telegram/z3TvDyHJ2ZNCRJ0X9w9PtwT_1v_yQk-ihtqyZcMIGAQJgDU", "content": "", "creation_timestamp": "2026-04-16T03:00:06.000000Z"}, {"uuid": "643f5442-74c1-4eb5-88e8-4b53c486a290", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12029", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8217", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12029\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_0, Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: A remote code execution vulnerability exists in invoke-ai/invokeai versions 5.3.1 through 5.4.2 via the /api/v2/models/install API. The vulnerability arises from unsafe deserialization of model files using torch.load without proper validation. Attackers can exploit this by embedding malicious code in model files, which is executed upon loading. This issue is fixed in version 5.4.3.\n\ud83d\udccf Published: 2025-03-20T10:08:45.570Z\n\ud83d\udccf Modified: 2025-03-20T14:33:03.024Z\n\ud83d\udd17 References:\n1. https://huntr.com/bounties/9b790f94-1b1b-4071-bc27-78445d1a87a3\n2. https://github.com/invoke-ai/invokeai/commit/756008dc5899081c5aa51e5bd8f24c1b3975a59e", "creation_timestamp": "2025-03-20T15:18:31.000000Z"}, {"uuid": "01e5750e-da25-4ef7-a6bd-53402874d47b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12029", "type": "published-proof-of-concept", "source": "Telegram/TH2kPKxkcvQyb1m-8snBxNJYC7rG2GntpZED8loGES4uw-U", "content": "", "creation_timestamp": "2025-02-20T20:00:06.000000Z"}, {"uuid": "61d9e8e5-3db3-4b4c-a356-14bdb69dc2fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12029", "type": "published-proof-of-concept", "source": "Telegram/ZISkoB043557Xv37GGFJzYg7Y_iIJ-ZMm0BHFwXa3auXqi8", "content": "", "creation_timestamp": "2026-04-15T23:00:08.000000Z"}, {"uuid": "f1c48243-893f-4cfe-a155-a653eb6e617a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12029", "type": "published-proof-of-concept", "source": "https://t.me/information_security_channel/53868", "content": "CVE-2024-12029 \u2013 InvokeAI Deserialization of Untrusted Data vulnerability\nhttps://www.offsec.com/blog/cve-2024-12029/\n\nCVE-2024-12029: A critical deserialization vulnerability in InvokeAI's /api/v2/models/install endpoint allows remote code execution via malicious model files. Exploit risk for AI art servers.\nThe post CVE-2024-12029 \u2013 InvokeAI Deserialization of Untrusted Data vulnerability (https://www.offsec.com/blog/cve-2024-12029/) appeared first on OffSec (https://www.offsec.com/).", "creation_timestamp": "2025-07-17T18:03:20.000000Z"}]}