7.2
CWE
502
Advisory Published
Advisory Published
Updated

CVE-2023-23930: vantage6's Pickle serialization is insecure

First published: Wed Oct 11 2023(Updated: )

### What We are using pickle as default serialization module but that has known security issues (see e.g. https://medium.com/ochrona/python-pickle-is-notoriously-insecure-d6651f1974c9). In summary, it is not advisable to open Pickles that you create yourself locally. In vantage6, algorithms use pickles to send aggregated data around and to pack algorithm input or output. All of the Python algorithms that use the wrappers with default serialization are therefore vulnerable to this issue. Solution: we should use JSON instead ### Impact All users of vantage6 that post tasks with algorithms that use the default serialization. The default serialization is used by default with all algorithm wrappers. ### Patches Not yet ### Workarounds Specify JSON serialization

Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
pip/vantage6<4.0.2
4.0.2
Vantage6<4.0.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-23930?

    CVE-2023-23930 is a vulnerability in vantage6, a privacy preserving federated learning infrastructure, versions prior to 4.0.0 that use pickle as the default serialization module with known security issues.

  • How does CVE-2023-23930 impact vantage6?

    CVE-2023-23930 can allow an attacker to open Pickles that are created locally, potentially leading to unauthorized access or execution of arbitrary code in vantage6.

  • What is the severity of CVE-2023-23930?

    CVE-2023-23930 has a severity level of 7.2 (high) according to the Common Vulnerability Scoring System (CVSS).

  • How can I fix CVE-2023-23930?

    To fix CVE-2023-23930, it is recommended to update vantage6 to version 4.0.0 or later, which no longer uses pickle as the default serialization module.

  • Where can I find more information about CVE-2023-23930?

    You can find more information about CVE-2023-23930 in the following references: [Reference 1](https://github.com/vantage6/vantage6/blob/0682c4288f43fee5bcc72dc448cdd99bd7e57f76/docs/release_notes.rst#400), [Reference 2](https://github.com/vantage6/vantage6/commit/e62f03bacf2247bd59eed217e2e7338c3a01a5f0), [Reference 3](https://github.com/vantage6/vantage6/security/advisories/GHSA-5m22-cfq9-86x6).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203