{"vulnerability": "CVE-2024-3568", "sightings": [{"uuid": "6ed7ef44-a54d-492b-8f9b-a201a279c3a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3568", "type": "seen", "source": "https://gist.github.com/mldangelo/5e56cdbad7c30d817af60936c4d1fd0b", "content": "", "creation_timestamp": "2025-08-18T18:40:36.000000Z"}, {"uuid": "c6dbde6f-459c-4fb5-aec0-d503ae2d73fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3568", "type": "seen", "source": "https://t.me/arpsyndicate/4542", "content": "#ExploitObserverAlert\n\nCVE-2024-3568\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-3568. The huggingface/transformers library is vulnerable to arbitrary code execution through deserialization of untrusted data within the `load_repo_checkpoint()` function of the `TFPreTrainedModel()` class. Attackers can execute arbitrary code and commands by crafting a malicious serialized payload, exploiting the use of `pickle.load()` on data from potentially untrusted sources. This vulnerability allows for remote code execution (RCE) by deceiving victims into loading a seemingly harmless checkpoint during a normal training process, thereby enabling attackers to execute arbitrary code on the targeted machine.\n\nFIRST-EPSS: 0.000430000\nARPS-EXPLOITABILITY: 0.5780347", "creation_timestamp": "2024-04-12T06:38:55.000000Z"}]}