Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34351: CWE-1188 Insecure Default Initialization of Resource in The Ray Team Anyscale Ray

0
Critical
VulnerabilityCVE-2025-34351cvecve-2025-34351cwe-1188
Published: Thu Nov 27 2025 (11/27/2025, 02:45:39 UTC)
Source: CVE Database V5
Vendor/Project: The Ray Team
Product: Anyscale Ray

Description

Anyscale Ray 2.52.0 contains an insecure default configuration in which token-based authentication for Ray management interfaces (including the dashboard and Jobs API) is disabled unless explicitly enabled by setting RAY_AUTH_MODE=token. In the default unauthenticated state, a remote attacker with network access to these interfaces can submit jobs and execute arbitrary code on the Ray cluster. NOTE: The vendor plans to enable token authentication by default in a future release. They recommend enabling token authentication to protect your cluster from unauthorized access.

AI-Powered Analysis

AILast updated: 11/27/2025, 03:08:57 UTC

Technical Analysis

CVE-2025-34351 is a critical security vulnerability identified in Anyscale Ray version 2.52.0, a distributed computing framework widely used for scalable AI and machine learning workloads. The root cause is an insecure default configuration where token-based authentication for Ray's management interfaces—including the dashboard and Jobs API—is disabled unless explicitly enabled by setting the environment variable RAY_AUTH_MODE=token. This default unauthenticated state allows any remote attacker with network access to these interfaces to submit arbitrary jobs and execute code on the cluster without any authentication or user interaction. The vulnerability is classified under CWE-1188, which pertains to insecure default initialization of resources, leading to unauthorized access. The CVSS 4.0 base score of 9.3 reflects the vulnerability's critical severity, with network attack vector, no required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. The vendor acknowledges the issue and plans to enable token authentication by default in future releases but currently recommends users manually enable token authentication to secure their clusters. No public exploits have been reported yet, but the ease of exploitation and potential for full cluster compromise make this a high-risk vulnerability. The lack of authentication on management interfaces exposes sensitive cluster control functions, making it possible for attackers to run arbitrary code, disrupt operations, or exfiltrate data.

Potential Impact

For European organizations, the impact of CVE-2025-34351 can be severe. Organizations using Anyscale Ray 2.52.0 or similar vulnerable versions risk unauthorized remote code execution on their distributed computing clusters. This can lead to full compromise of AI/ML workloads, data theft, manipulation of computational results, and disruption of critical services relying on Ray clusters. Given the growing adoption of AI and distributed computing in sectors such as finance, automotive, healthcare, and research across Europe, exploitation could result in significant operational and reputational damage. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where management interfaces are exposed to untrusted networks or insufficiently segmented internal networks. Additionally, attackers could leverage compromised clusters as pivot points for lateral movement within corporate networks. The absence of known exploits currently provides a window for proactive mitigation, but the critical severity demands immediate attention.

Mitigation Recommendations

To mitigate CVE-2025-34351 effectively, European organizations should: 1) Immediately enable token-based authentication by setting RAY_AUTH_MODE=token on all Anyscale Ray 2.52.0 deployments to enforce authentication on management interfaces. 2) Restrict network access to Ray management interfaces (dashboard and Jobs API) using network segmentation, firewalls, or VPNs to limit exposure to trusted administrators only. 3) Monitor network traffic and logs for any unauthorized access attempts or anomalous job submissions to detect potential exploitation. 4) Apply strict access controls and role-based permissions within the Ray cluster to minimize the impact of any compromised credentials. 5) Plan and test upgrades to future Anyscale Ray versions where token authentication is enabled by default to ensure timely patching. 6) Conduct security audits of cluster configurations to identify any other insecure defaults or misconfigurations. 7) Educate DevOps and security teams about the risks of default configurations and the importance of secure initialization. These steps go beyond generic advice by focusing on configuration hardening, network-level protections, and proactive monitoring tailored to the specific nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.589Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6927bf816cbf1e727e3d95b7

Added to database: 11/27/2025, 3:03:29 AM

Last enriched: 11/27/2025, 3:08:57 AM

Last updated: 11/27/2025, 5:09:00 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats