Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66960: n/a

0
High
VulnerabilityCVE-2025-66960cvecve-2025-66960
Published: Wed Jan 21 2026 (01/21/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in ollama v.0.12.10 allows a remote attacker to cause a denial of service via the fs/ggml/gguf.go, function readGGUFV1String reads a string length from untrusted GGUF metadata

AI-Powered Analysis

AILast updated: 01/28/2026, 20:08:06 UTC

Technical Analysis

CVE-2025-66960 is a vulnerability identified in the open-source or proprietary software component ollama, specifically version 0.12.10. The issue arises in the function readGGUFV1String located in the source file fs/ggml/gguf.go. This function is responsible for reading string lengths from GGUF metadata, which is untrusted input. Due to insufficient validation of the string length value, a remote attacker can supply malformed GGUF metadata that triggers excessive resource consumption or crashes the application, resulting in a denial of service (DoS). The vulnerability is categorized under CWE-400, indicating uncontrolled resource consumption, and CWE-20, which involves improper input validation. The CVSS v3.1 base score is 7.5, reflecting high severity, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No patches or fixes are currently listed, and no exploits have been reported in the wild as of the publication date (January 21, 2026). This vulnerability could be exploited by attackers to disrupt services relying on ollama, potentially impacting AI/ML workflows or applications that utilize GGUF metadata parsing. The lack of authentication or user interaction requirements increases the risk of automated exploitation attempts.

Potential Impact

For European organizations, the primary impact of CVE-2025-66960 is the potential for denial of service attacks that could disrupt critical AI/ML services or software relying on ollama components. This could lead to downtime, loss of productivity, and interruption of business operations, particularly in sectors heavily dependent on AI technologies such as finance, healthcare, manufacturing, and research institutions. The vulnerability does not compromise data confidentiality or integrity but can degrade system availability, which is critical for real-time or high-availability environments. Organizations running vulnerable versions in production or development environments may face increased risk of targeted attacks or automated scanning. Additionally, the disruption could affect supply chains or collaborative projects involving AI models if shared infrastructure is impacted. The lack of known exploits currently provides a window for proactive mitigation, but the ease of exploitation and network accessibility make timely remediation essential.

Mitigation Recommendations

1. Monitor official ollama repositories and vendor communications for patches or updates addressing CVE-2025-66960 and apply them promptly once available. 2. Implement network-level access controls to restrict exposure of services parsing GGUF metadata to trusted internal networks or VPNs only. 3. Employ input validation and sanitization mechanisms at the application or middleware layer to detect and reject malformed GGUF metadata before processing. 4. Use runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect anomalous requests targeting the vulnerable function. 5. Conduct regular vulnerability scanning and penetration testing focused on AI/ML components and their dependencies. 6. Establish monitoring and alerting for unusual resource consumption or application crashes related to ollama services. 7. Educate development and security teams about the risks of improper input validation in AI/ML software to prevent similar issues in future code. 8. Consider isolating or sandboxing the processing of untrusted GGUF metadata to limit the impact of potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697124574623b1157ce65285

Added to database: 1/21/2026, 7:09:11 PM

Last enriched: 1/28/2026, 8:08:06 PM

Last updated: 2/7/2026, 12:30:46 PM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats