Skip to main content

CVE-2025-1975: CWE-129 Improper Validation of Array Index in ollama ollama/ollama

High
VulnerabilityCVE-2025-1975cvecve-2025-1975cwe-129
Published: Fri May 16 2025 (05/16/2025, 08:25:57 UTC)
Source: CVE
Vendor/Project: ollama
Product: ollama/ollama

Description

A vulnerability in the Ollama server version 0.5.11 allows a malicious user to cause a Denial of Service (DoS) attack by customizing the manifest content and spoofing a service. This is due to improper validation of array index access when downloading a model via the /api/pull endpoint, which can lead to a server crash.

AI-Powered Analysis

AILast updated: 07/11/2025, 23:19:33 UTC

Technical Analysis

CVE-2025-1975 is a high-severity vulnerability affecting the Ollama server, specifically version 0.5.11. The vulnerability arises from improper validation of array index access (CWE-129) during the process of downloading a model via the /api/pull endpoint. An attacker can exploit this flaw by customizing the manifest content and spoofing a service, which leads to an out-of-bounds array access. This improper validation causes the server to crash, resulting in a Denial of Service (DoS) condition. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network (AV:N, AC:L, PR:N, UI:N). The impact is limited to availability, with no direct confidentiality or integrity compromise reported. Although no known exploits are currently observed in the wild, the ease of exploitation and the potential to disrupt service make this a significant threat to organizations relying on the Ollama server for AI model management or deployment.

Potential Impact

For European organizations using the Ollama server, this vulnerability poses a risk of service disruption. Organizations that depend on Ollama for AI model hosting or inference could experience downtime, affecting business continuity and potentially delaying critical AI-driven operations. The DoS attack could also be leveraged as part of a larger attack chain to distract or degrade defenses. In sectors such as finance, healthcare, or critical infrastructure where AI services are increasingly integrated, such disruptions could have cascading effects on operational efficiency and service delivery. Additionally, organizations with stringent uptime requirements or service-level agreements (SLAs) may face compliance and reputational risks if exploited.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately update the Ollama server to a patched version once available from the vendor, as no patch links are currently provided but should be prioritized upon release. 2) Implement network-level protections such as web application firewalls (WAFs) and intrusion prevention systems (IPS) to detect and block malformed requests targeting the /api/pull endpoint. 3) Restrict access to the Ollama server API to trusted internal networks or VPNs to reduce exposure to unauthenticated remote attacks. 4) Monitor server logs for unusual activity or repeated crashes related to model downloads, enabling rapid detection and response. 5) Employ rate limiting on API endpoints to reduce the risk of automated exploitation attempts. 6) Conduct regular security assessments and code reviews focusing on input validation to prevent similar vulnerabilities in custom or third-party AI infrastructure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2025-03-04T21:57:53.651Z
Cisa Enriched
true
Cvss Version
3.0
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebdc5

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 11:19:33 PM

Last updated: 8/16/2025, 1:32:34 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats