DEBIAN-CVE-2026-28500

Source
https://security-tracker.debian.org/tracker/CVE-2026-28500
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-28500.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-28500
Upstream
Published
2026-03-18T02:16:24.227Z
Modified
2026-03-19T09:00:47.078446Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is designed to warn users when loading models from non-official sources, the use of the silent=True parameter completely suppresses all security warnings and confirmation prompts. This vulnerability transforms a standard model-loading function into a vector for Zero-Interaction Supply-Chain Attacks. When chained with file-system vulnerabilities, an attacker can silently exfiltrate sensitive files (SSH keys, cloud credentials) from the victim's machine the moment the model is loaded. As of time of publication, no known patched versions are available.

References

Affected packages

Debian:11 / onnx

Package

Name
onnx
Purl
pkg:deb/debian/onnx?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.7.0+dfsg-3
1.7.0+dfsg-3.1
1.12.0-1~exp1
1.12.0-1
1.12.0-2
1.13.1-1
1.13.1-2
1.13.1-3
1.14.1-1
1.14.1-2
1.14.1-2.1~exp1
1.14.1-2.1
1.16.1-1
1.16.2-1
1.17.0-1
1.17.0-2
1.17.0-3
1.19.1-1~exp1
1.20.0-1~exp1
1.20.0-1
1.20.0-3
1.20.0-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-28500.json"

Debian:12 / onnx

Package

Name
onnx
Purl
pkg:deb/debian/onnx?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.12.0-2
1.13.1-1
1.13.1-2
1.13.1-3
1.14.1-1
1.14.1-2
1.14.1-2.1~exp1
1.14.1-2.1
1.16.1-1
1.16.2-1
1.17.0-1
1.17.0-2
1.17.0-3
1.19.1-1~exp1
1.20.0-1~exp1
1.20.0-1
1.20.0-3
1.20.0-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-28500.json"

Debian:13 / onnx

Package

Name
onnx
Purl
pkg:deb/debian/onnx?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.17.0-3
1.19.1-1~exp1
1.20.0-1~exp1
1.20.0-1
1.20.0-3
1.20.0-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-28500.json"

Debian:14 / onnx

Package

Name
onnx
Purl
pkg:deb/debian/onnx?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.17.0-3
1.19.1-1~exp1
1.20.0-1~exp1
1.20.0-1
1.20.0-3
1.20.0-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-28500.json"