Denial of Service in aimhubio/aim
Description
A vulnerability in aimhubio/aim version 3.25.0 allows for a denial of service through the misuse of the sshfs-client. The tracking server, which is single-threaded, can be made unresponsive by requesting it to connect to an unresponsive socket via sshfs. The lack of an additional timeout setting in the sshfs-client causes the server to hang for a significant amount of time, preventing it from responding to other requests.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Aim v3.25.0 denial of service via sshfs-client misuse causes single-threaded server to hang on unresponsive socket.
Vulnerability
Description
CVE-2024-12777 affects aimhubio/aim version 3.25.0. The tracking server is single-threaded and uses the sshfs-client to mount remote filesystems. The sshfs-client lacks a configurable timeout, causing the server to hang indefinitely when attempting to connect to an unresponsive socket [1][2]. This is a classic resource exhaustion vulnerability.
Exploitation
An attacker who can send a request to the tracking server can trigger the hang by requesting a connection to an unresponsive socket via sshfs. The single-threaded nature of the server means that while the connection attempt hangs, the server cannot process any other requests [2]. No special privileges are required beyond the ability to interact with the server's API.
Impact
Successful exploitation results in a denial of service (DoS). The tracking server becomes unresponsive, interrupting experiment tracking and rendering the service unavailable to legitimate users [4]. There is no confidentiality or integrity impact.
Mitigation
Status
Currently, no patch is available in the referenced sources [3]. Users should monitor the vendor's repository for updates and consider implementing a timeout or limiting sshfs requests as a workaround [1][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
aimPyPI | <= 3.25.0 | — |
Affected products
3- aimhubio/aimhubio/aimv5Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.