HomeCyber BalkansOllama AI Platform Vulnerability Allows Attackers to Execute Remote Code

Ollama AI Platform Vulnerability Allows Attackers to Execute Remote Code

Published on

spot_img

In recent news, hackers have been targeting AI infrastructure platforms due to the valuable data, sophisticated algorithms, and significant computational resources they contain. By compromising these platforms, hackers can gain access to proprietary models, sensitive information, and even manipulate the outcomes of AI systems.

One such incident involved the discovery of a critical vulnerability in the Ollama AI infrastructure platform by cybersecurity researchers at Wiz Research. This flaw, tracked as “CVE-2024-37032” or “Probllama,” enables threat actors to execute remote code on the platform. Ollama is a popular open-source project for AI model deployment with over 70,000 GitHub stars.

While the vulnerability has been responsibly disclosed and mitigated, users are advised to update their Ollama installations to version 0.1.34 or later to protect themselves. Despite this, as of June 10, many internet-facing Ollama instances were still running vulnerable versions, underscoring the importance of patching systems to prevent potential attacks.

The researchers at Wiz found that the vulnerability in Ollama could lead to arbitrary file overwrites and remote code execution, particularly on Docker installations with root privileges. The issue stems from insufficient input validation in the /api/pull endpoint, allowing for path traversal via malicious manifest files. This emphasizes the necessity for enhanced security measures in AI platforms.

The critical nature of this vulnerability enables threat actors to create and execute malicious files using path traversal, potentially leading to arbitrary reading and writing of files. In Docker installations with root privileges, attackers could leverage this to remotely execute code by manipulating system files. The attack typically initiates when querying the /api/chat endpoint to load the attacker’s payload, posing a significant risk even to non-root installations.

Security experts recommend promptly updating Ollama instances and avoiding exposing them to the internet without authentication. While Linux installations default to binding to localhost, Docker deployments publicly expose the API server, increasing the risk of remote exploitation. This incident underscores the need for robust security measures in the rapidly evolving landscape of AI technologies.

The disclosure timeline of this vulnerability reveals the proactive response from both Wiz Research and Ollama in addressing the issue. Wiz Research reported the vulnerability to Ollama on May 5, 2024, and Ollama promptly acknowledged and committed a fix to GitHub. By May 8, 2024, Ollama had released a patched version, with Wiz Research publishing a blog about the issue on June 24, 2024.

In conclusion, the recent discovery of a critical vulnerability in the Ollama AI infrastructure platform serves as a stark reminder of the cybersecurity risks associated with AI systems. It highlights the importance of vigilance, prompt patching, and robust security measures to safeguard sensitive data and prevent exploitation by malicious actors. As AI technologies continue to advance, staying ahead of potential threats through proactive security practices is essential to mitigating risks and protecting valuable assets.

Source link

Latest articles

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

Securing Telecoms in the Age of AI and Critical Infrastructure

 As we reflect on World Telecommunication and Information Society Day (WTISD) 2025, marked...

The VPN You Shouldn’t Have Downloaded

Source : The Hacker NewsA sophisticated malware campaign has emerged, leveraging counterfeit VPN...

Even Resilient Organizations Are Blind to AI Threats

Organizations are underestimating the advanced technology's risks to the software supply chain, according...

More like this

Why Business Impact Should Lead the Security Conversation

 Security teams face growing demands with more tools, more data, and higher expectations...

Securing Telecoms in the Age of AI and Critical Infrastructure

 As we reflect on World Telecommunication and Information Society Day (WTISD) 2025, marked...

The VPN You Shouldn’t Have Downloaded

Source : The Hacker NewsA sophisticated malware campaign has emerged, leveraging counterfeit VPN...