CVE-2025-1975: CWE-129 Improper Validation of Array Index in ollama ollama/ollama
A vulnerability in the Ollama server version 0.5.11 allows a malicious user to cause a Denial of Service (DoS) attack by customizing the manifest content and spoofing a service. This is due to improper validation of array index access when downloading a model via the /api/pull endpoint, which can lead to a server crash.
AI Analysis
Technical Summary
CVE-2025-1975 is a high-severity vulnerability affecting the Ollama server, specifically version 0.5.11. The vulnerability arises from improper validation of array index access (CWE-129) during the process of downloading a model via the /api/pull endpoint. An attacker can exploit this flaw by customizing the manifest content and spoofing a service, which leads to an out-of-bounds array access. This improper validation causes the server to crash, resulting in a Denial of Service (DoS) condition. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network (AV:N, AC:L, PR:N, UI:N). The impact is limited to availability, with no direct confidentiality or integrity compromise reported. Although no known exploits are currently observed in the wild, the ease of exploitation and the potential to disrupt service make this a significant threat to organizations relying on the Ollama server for AI model management or deployment.
Potential Impact
For European organizations using the Ollama server, this vulnerability poses a risk of service disruption. Organizations that depend on Ollama for AI model hosting or inference could experience downtime, affecting business continuity and potentially delaying critical AI-driven operations. The DoS attack could also be leveraged as part of a larger attack chain to distract or degrade defenses. In sectors such as finance, healthcare, or critical infrastructure where AI services are increasingly integrated, such disruptions could have cascading effects on operational efficiency and service delivery. Additionally, organizations with stringent uptime requirements or service-level agreements (SLAs) may face compliance and reputational risks if exploited.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update the Ollama server to a patched version once available from the vendor, as no patch links are currently provided but should be prioritized upon release. 2) Implement network-level protections such as web application firewalls (WAFs) and intrusion prevention systems (IPS) to detect and block malformed requests targeting the /api/pull endpoint. 3) Restrict access to the Ollama server API to trusted internal networks or VPNs to reduce exposure to unauthenticated remote attacks. 4) Monitor server logs for unusual activity or repeated crashes related to model downloads, enabling rapid detection and response. 5) Employ rate limiting on API endpoints to reduce the risk of automated exploitation attempts. 6) Conduct regular security assessments and code reviews focusing on input validation to prevent similar vulnerabilities in custom or third-party AI infrastructure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-1975: CWE-129 Improper Validation of Array Index in ollama ollama/ollama
Description
A vulnerability in the Ollama server version 0.5.11 allows a malicious user to cause a Denial of Service (DoS) attack by customizing the manifest content and spoofing a service. This is due to improper validation of array index access when downloading a model via the /api/pull endpoint, which can lead to a server crash.
AI-Powered Analysis
Technical Analysis
CVE-2025-1975 is a high-severity vulnerability affecting the Ollama server, specifically version 0.5.11. The vulnerability arises from improper validation of array index access (CWE-129) during the process of downloading a model via the /api/pull endpoint. An attacker can exploit this flaw by customizing the manifest content and spoofing a service, which leads to an out-of-bounds array access. This improper validation causes the server to crash, resulting in a Denial of Service (DoS) condition. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network (AV:N, AC:L, PR:N, UI:N). The impact is limited to availability, with no direct confidentiality or integrity compromise reported. Although no known exploits are currently observed in the wild, the ease of exploitation and the potential to disrupt service make this a significant threat to organizations relying on the Ollama server for AI model management or deployment.
Potential Impact
For European organizations using the Ollama server, this vulnerability poses a risk of service disruption. Organizations that depend on Ollama for AI model hosting or inference could experience downtime, affecting business continuity and potentially delaying critical AI-driven operations. The DoS attack could also be leveraged as part of a larger attack chain to distract or degrade defenses. In sectors such as finance, healthcare, or critical infrastructure where AI services are increasingly integrated, such disruptions could have cascading effects on operational efficiency and service delivery. Additionally, organizations with stringent uptime requirements or service-level agreements (SLAs) may face compliance and reputational risks if exploited.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update the Ollama server to a patched version once available from the vendor, as no patch links are currently provided but should be prioritized upon release. 2) Implement network-level protections such as web application firewalls (WAFs) and intrusion prevention systems (IPS) to detect and block malformed requests targeting the /api/pull endpoint. 3) Restrict access to the Ollama server API to trusted internal networks or VPNs to reduce exposure to unauthenticated remote attacks. 4) Monitor server logs for unusual activity or repeated crashes related to model downloads, enabling rapid detection and response. 5) Employ rate limiting on API endpoints to reduce the risk of automated exploitation attempts. 6) Conduct regular security assessments and code reviews focusing on input validation to prevent similar vulnerabilities in custom or third-party AI infrastructure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-03-04T21:57:53.651Z
- Cisa Enriched
- true
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebdc5
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 11:19:33 PM
Last updated: 10/7/2025, 1:52:58 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.