CVE-2025-1975: CWE-129 Improper Validation of Array Index in ollama ollama/ollama
A vulnerability in the Ollama server version 0.5.11 allows a malicious user to cause a Denial of Service (DoS) attack by customizing the manifest content and spoofing a service. This is due to improper validation of array index access when downloading a model via the /api/pull endpoint, which can lead to a server crash.
AI Analysis
Technical Summary
CVE-2025-1975 is a high-severity vulnerability affecting the Ollama server, specifically version 0.5.11. The vulnerability arises from improper validation of array index access (CWE-129) during the process of downloading a model via the /api/pull endpoint. An attacker can exploit this flaw by customizing the manifest content and spoofing a service, which leads to an out-of-bounds array access. This improper validation causes the server to crash, resulting in a Denial of Service (DoS) condition. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network (AV:N, AC:L, PR:N, UI:N). The impact is limited to availability, with no direct confidentiality or integrity compromise reported. Although no known exploits are currently observed in the wild, the ease of exploitation and the potential to disrupt service make this a significant threat to organizations relying on the Ollama server for AI model management or deployment.
Potential Impact
For European organizations using the Ollama server, this vulnerability poses a risk of service disruption. Organizations that depend on Ollama for AI model hosting or inference could experience downtime, affecting business continuity and potentially delaying critical AI-driven operations. The DoS attack could also be leveraged as part of a larger attack chain to distract or degrade defenses. In sectors such as finance, healthcare, or critical infrastructure where AI services are increasingly integrated, such disruptions could have cascading effects on operational efficiency and service delivery. Additionally, organizations with stringent uptime requirements or service-level agreements (SLAs) may face compliance and reputational risks if exploited.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update the Ollama server to a patched version once available from the vendor, as no patch links are currently provided but should be prioritized upon release. 2) Implement network-level protections such as web application firewalls (WAFs) and intrusion prevention systems (IPS) to detect and block malformed requests targeting the /api/pull endpoint. 3) Restrict access to the Ollama server API to trusted internal networks or VPNs to reduce exposure to unauthenticated remote attacks. 4) Monitor server logs for unusual activity or repeated crashes related to model downloads, enabling rapid detection and response. 5) Employ rate limiting on API endpoints to reduce the risk of automated exploitation attempts. 6) Conduct regular security assessments and code reviews focusing on input validation to prevent similar vulnerabilities in custom or third-party AI infrastructure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-1975: CWE-129 Improper Validation of Array Index in ollama ollama/ollama
Description
A vulnerability in the Ollama server version 0.5.11 allows a malicious user to cause a Denial of Service (DoS) attack by customizing the manifest content and spoofing a service. This is due to improper validation of array index access when downloading a model via the /api/pull endpoint, which can lead to a server crash.
AI-Powered Analysis
Technical Analysis
CVE-2025-1975 is a high-severity vulnerability affecting the Ollama server, specifically version 0.5.11. The vulnerability arises from improper validation of array index access (CWE-129) during the process of downloading a model via the /api/pull endpoint. An attacker can exploit this flaw by customizing the manifest content and spoofing a service, which leads to an out-of-bounds array access. This improper validation causes the server to crash, resulting in a Denial of Service (DoS) condition. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network (AV:N, AC:L, PR:N, UI:N). The impact is limited to availability, with no direct confidentiality or integrity compromise reported. Although no known exploits are currently observed in the wild, the ease of exploitation and the potential to disrupt service make this a significant threat to organizations relying on the Ollama server for AI model management or deployment.
Potential Impact
For European organizations using the Ollama server, this vulnerability poses a risk of service disruption. Organizations that depend on Ollama for AI model hosting or inference could experience downtime, affecting business continuity and potentially delaying critical AI-driven operations. The DoS attack could also be leveraged as part of a larger attack chain to distract or degrade defenses. In sectors such as finance, healthcare, or critical infrastructure where AI services are increasingly integrated, such disruptions could have cascading effects on operational efficiency and service delivery. Additionally, organizations with stringent uptime requirements or service-level agreements (SLAs) may face compliance and reputational risks if exploited.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately update the Ollama server to a patched version once available from the vendor, as no patch links are currently provided but should be prioritized upon release. 2) Implement network-level protections such as web application firewalls (WAFs) and intrusion prevention systems (IPS) to detect and block malformed requests targeting the /api/pull endpoint. 3) Restrict access to the Ollama server API to trusted internal networks or VPNs to reduce exposure to unauthenticated remote attacks. 4) Monitor server logs for unusual activity or repeated crashes related to model downloads, enabling rapid detection and response. 5) Employ rate limiting on API endpoints to reduce the risk of automated exploitation attempts. 6) Conduct regular security assessments and code reviews focusing on input validation to prevent similar vulnerabilities in custom or third-party AI infrastructure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-03-04T21:57:53.651Z
- Cisa Enriched
- true
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebdc5
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 11:19:33 PM
Last updated: 8/16/2025, 1:32:34 AM
Views: 17
Related Threats
CVE-2025-8193
LowCVE-2025-9356: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-9355: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-43761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-24902: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.