We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30202

Data exposure via ZeroMQ on multi-node vLLM deployment



Description

vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.5.2 and prior to 0.8.5 are vulnerable to denial of service and data exposure via ZeroMQ on multi-node vLLM deployment. In a multi-node vLLM deployment, vLLM uses ZeroMQ for some multi-node communication purposes. The primary vLLM host opens an XPUB ZeroMQ socket and binds it to ALL interfaces. While the socket is always opened for a multi-node deployment, it is only used when doing tensor parallelism across multiple hosts. Any client with network access to this host can connect to this XPUB socket unless its port is blocked by a firewall. Once connected, these arbitrary clients will receive all of the same data broadcasted to all of the secondary vLLM hosts. This data is internal vLLM state information that is not useful to an attacker. By potentially connecting to this socket many times and not reading data published to them, an attacker can also cause a denial of service by slowing down or potentially blocking the publisher. This issue has been patched in version 0.8.5.

Reserved 2025-03-18 | Published 2025-04-30 | Updated 2025-04-30 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

>= 0.5.2, < 0.8.5
affected

References

github.com/...t/vllm/security/advisories/GHSA-9f8f-2vmf-885j

github.com/vllm-project/vllm/pull/6183

github.com/...ommit/a0304dc504c85f421d38ef47c64f83046a13641c

cve.org (CVE-2025-30202)

nvd.nist.gov (CVE-2025-30202)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30202

Support options

Helpdesk Chat, Email, Knowledgebase