CVE-2026-7141
LOW
2,9
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
MEDIUM
5,6
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: low
MEDIUM
5,1
Source: [email protected]
Access Vector: network
Access Complexity: high
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: partial
Description
AI Translation Available
A vulnerability was found in vllm up to 0.19.0. The affected element is the function has_mamba_layers of the file vllm/v1/kv_cache_interface.py of the component KV Block Handler. Performing a manipulation results in uninitialized resource. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is described as difficult. The exploit has been made public and could be used. The patch is named 1ad67864c0c20f167929e64c875f5c28e1aad9fd. To fix this issue, it is recommended to deploy a patch.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0007
Percentile
0,2th
Updated
EPSS Score Trend (Last 2 Days)
908
Use of Uninitialized Resource
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Availability
Potential Impacts:
Read Memory
Read Application Data
Dos: Crash, Exit, Or Restart
Applicable Platforms
All platforms may be affected
Application
Vllm by Vllm
Version Range Affected
To
0.19.0
(inclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:vllm:vllm:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/AjAnubolu/vllm/commit/1ad67864c0c20f167929e64c875f5c28e1aad9…
https://github.com/vllm-project/vllm/issues/39146
https://github.com/vllm-project/vllm/issues/39146#issue-4215090365
https://github.com/vllm-project/vllm/pull/39283
https://vuldb.com/submit/801297
https://vuldb.com/vuln/359740
https://vuldb.com/vuln/359740/cti