The cybersecurity firm explains that Ollama launches by default without authentication, and that it listens to all network interfaces, meaning that all internet-accessible instances are prone to exploitation.“With approximately 300,000 Ollama servers currently exposed on the public internet, this vulnerability is immediately and broadly exploitable – no credentials required,” Cyera warns.Depending on how Ollama is used, successful exploitation of Bleeding Llama could expose employee interactions, development code, routed tool outputs, and prompts containing PII, PHI, and other sensitive information.According to Cyera, “any deployment where Ollama is network-accessible without a firewall or authentication proxy in front of it” is at risk of exploitation.The vulnerability was addressed in Ollama version 0.17.1. Organizations are advised to apply the fix as soon as possible and restrict network access to their deployments. Deploying an authentication proxy and network segmentation should improve security.Organizations should also audit running instances for internet exposure and consider any instance accessible from the internet, as well as the environment variables and data passing through it, to be compromised.Related:MetInfo, Weaver E-cology Vulnerabilities in Attackers’ CrosshairsRelated:WhatsApp Discloses File Spoofing, Arbitrary URL Scheme VulnerabilitiesRelated:Firefox Vulnerability Allows Tor User FingerprintingRelated:Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

“With approximately 300,000 Ollama servers currently exposed on the public internet, this vulnerability is immediately and broadly exploitable – no credentials required,” Cyera warns.Depending on how Ollama is used, successful exploitation of Bleeding Llama could expose employee interactions, development code, routed tool outputs, and prompts containing PII, PHI, and other sensitive information.According to Cyera, “any deployment where Ollama is network-accessible without a firewall or authentication proxy in front of it” is at risk of exploitation.The vulnerability was addressed in Ollama version 0.17.1. Organizations are advised to apply the fix as soon as possible and restrict network access to their deployments. Deploying an authentication proxy and network segmentation should improve security.Organizations should also audit running instances for internet exposure and consider any instance accessible from the internet, as well as the environment variables and data passing through it, to be compromised.Related:MetInfo, Weaver E-cology Vulnerabilities in Attackers’ CrosshairsRelated:WhatsApp Discloses File Spoofing, Arbitrary URL Scheme VulnerabilitiesRelated:Firefox Vulnerability Allows Tor User FingerprintingRelated:Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

Depending on how Ollama is used, successful exploitation of Bleeding Llama could expose employee interactions, development code, routed tool outputs, and prompts containing PII, PHI, and other sensitive information.According to Cyera, “any deployment where Ollama is network-accessible without a firewall or authentication proxy in front of it” is at risk of exploitation.The vulnerability was addressed in Ollama version 0.17.1. Organizations are advised to apply the fix as soon as possible and restrict network access to their deployments. Deploying an authentication proxy and network segmentation should improve security.Organizations should also audit running instances for internet exposure and consider any instance accessible from the internet, as well as the environment variables and data passing through it, to be compromised.Related:MetInfo, Weaver E-cology Vulnerabilities in Attackers’ CrosshairsRelated:WhatsApp Discloses File Spoofing, Arbitrary URL Scheme VulnerabilitiesRelated:Firefox Vulnerability Allows Tor User FingerprintingRelated:Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

According to Cyera, “any deployment where Ollama is network-accessible without a firewall or authentication proxy in front of it” is at risk of exploitation.The vulnerability was addressed in Ollama version 0.17.1. Organizations are advised to apply the fix as soon as possible and restrict network access to their deployments. Deploying an authentication proxy and network segmentation should improve security.Organizations should also audit running instances for internet exposure and consider any instance accessible from the internet, as well as the environment variables and data passing through it, to be compromised.Related:MetInfo, Weaver E-cology Vulnerabilities in Attackers’ CrosshairsRelated:WhatsApp Discloses File Spoofing, Arbitrary URL Scheme VulnerabilitiesRelated:Firefox Vulnerability Allows Tor User FingerprintingRelated:Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

The vulnerability was addressed in Ollama version 0.17.1. Organizations are advised to apply the fix as soon as possible and restrict network access to their deployments. Deploying an authentication proxy and network segmentation should improve security.Organizations should also audit running instances for internet exposure and consider any instance accessible from the internet, as well as the environment variables and data passing through it, to be compromised.Related:MetInfo, Weaver E-cology Vulnerabilities in Attackers’ CrosshairsRelated:WhatsApp Discloses File Spoofing, Arbitrary URL Scheme VulnerabilitiesRelated:Firefox Vulnerability Allows Tor User FingerprintingRelated:Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

Organizations should also audit running instances for internet exposure and consider any instance accessible from the internet, as well as the environment variables and data passing through it, to be compromised.Related:MetInfo, Weaver E-cology Vulnerabilities in Attackers’ CrosshairsRelated:WhatsApp Discloses File Spoofing, Arbitrary URL Scheme VulnerabilitiesRelated:Firefox Vulnerability Allows Tor User FingerprintingRelated:Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

Related:MetInfo, Weaver E-cology Vulnerabilities in Attackers’ CrosshairsRelated:WhatsApp Discloses File Spoofing, Arbitrary URL Scheme VulnerabilitiesRelated:Firefox Vulnerability Allows Tor User FingerprintingRelated:Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

Related:WhatsApp Discloses File Spoofing, Arbitrary URL Scheme VulnerabilitiesRelated:Firefox Vulnerability Allows Tor User FingerprintingRelated:Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

Related:Firefox Vulnerability Allows Tor User FingerprintingRelated:Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

Related:Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

Source: SecurityWeek