Article Details

Scrape Timestamp (UTC): 2024-11-04 14:10:16.158

Source: https://thehackernews.com/2024/11/critical-flaws-in-ollama-ai-framework.html

Original Article Text

Click to Toggle View

Critical Flaws in Ollama AI Framework Could Enable DoS, Model Theft, and Poisoning. Cybersecurity researchers have disclosed six security flaws in the Ollama artificial intelligence (AI) framework that could be exploited by a malicious actor to perform various actions, including denial-of-service, model poisoning, and model theft. "Collectively, the vulnerabilities could allow an attacker to carry out a wide-range of malicious actions with a single HTTP request, including denial-of-service (DoS) attacks, model poisoning, model theft, and more," Oligo Security researcher Avi Lumelsky said in a report published last week. Ollama is an open-source application that allows users to deploy and operate large language models (LLMs) locally on Windows, Linux, and macOS devices. Its project repository on GitHub has been forked 7,600 times to date. A brief description of the six vulnerabilities is below - For both unresolved vulnerabilities, the maintainers of Ollama have recommended that users filter which endpoints are exposed to the internet by means of a proxy or a web application firewall. "Meaning that, by default, not all endpoints should be exposed," Lumelsky said. "That's a dangerous assumption. Not everybody is aware of that, or filters http routing to Ollama. Currently, these endpoints are available through the default port of Ollama as part of every deployment, without any separation or documentation to back it up." Oligo said it found 9,831 unique internet-facing instances that run Ollama, with a majority of them located in China, the U.S., Germany, South Korea, Taiwan, France, the U.K., India, Singapore, and Hong Kong. One out of four internet-facing servers has been deemed vulnerable to the identified flaws. The development comes more than four months after cloud security firm Wiz disclosed a severe flaw impacting Ollama (CVE-2024-37032) that could have been exploited to achieve remote code execution. "Exposing Ollama to the internet without authorization is the equivalent to exposing the docker socket to the public internet, because it can upload files and has model pull and push capabilities (that can be abused by attackers)," Lumelsky noted.

Daily Brief Summary

DDOS // Security Flaws in Ollama AI Could Allow DoS and Theft Attacks

Cybersecurity researchers identified six critical vulnerabilities in the Ollama AI framework.

These security flaws can lead to denial-of-service (DoS) attacks, model poisoning, and model theft.

Vulnerable instances of Ollama are widely exposed on the internet across various countries, with significant concentrations in China and the U.S.

One in four internet-facing Ollama servers is susceptible to these flaws.

Ollama’s maintainers suggested mitigating these issues by limiting endpoint exposure through web application firewalls or proxies.

Past incidents include a severe flaw reported by Wiz that could have permitted remote code execution.

The report encourages users to avoid exposing unnecessary Ollama endpoints to the internet to prevent exploitation.