CVE-2026-27482: CWE-396: Declaration of Catch for Generic Exception in ray-project ray
Ray is an AI compute engine. In versions 2.53.0 and below, thedashboard HTTP server blocks browser-origin POST/PUT but does not cover DELETE, and key DELETE endpoints are unauthenticated by default. If the dashboard/agent is reachable (e.g., --dashboard-host=0.0.0.0), a web page via DNS rebinding or same-network access can issue DELETE requests that shut down Serve or delete jobs without user interaction. This is a drive-by availability impact. The fix for this vulnerability is to update to Ray 2.54.0 or higher.
AI Analysis
Technical Summary
CVE-2026-27482 affects the Ray AI compute engine, specifically versions 2.53.0 and earlier. The vulnerability arises because the dashboard HTTP server blocks browser-origin POST and PUT requests but fails to block DELETE requests. Moreover, critical DELETE endpoints are unauthenticated by default, meaning that if the dashboard or agent is reachable on a network interface (for example, if launched with --dashboard-host=0.0.0.0), an attacker can send DELETE requests to the dashboard. These requests can shut down the Serve component or delete running jobs, causing denial of service. The attack vector includes DNS rebinding or direct same-network access, enabling a malicious web page or attacker on the local network to perform these actions without user authentication or explicit user interaction beyond visiting a malicious page. The vulnerability is classified under CWE-396, which relates to the declaration of catch for generic exceptions, indicating a design flaw in error handling or access control. The CVSS v3.1 score is 5.9 (medium), reflecting network attack vector, high attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, low integrity impact, and high availability impact. The fix involves updating Ray to version 2.54.0 or later, where these endpoints are properly secured and DELETE requests are blocked or authenticated. No public exploits are known at this time, but the vulnerability poses a risk to availability in exposed deployments.
Potential Impact
The primary impact of CVE-2026-27482 is on availability. Attackers can remotely cause denial of service by shutting down the Serve component or deleting jobs managed by Ray’s dashboard without authentication. This can disrupt AI workloads, data processing pipelines, and any dependent services, potentially causing operational downtime and loss of computational progress. Since the vulnerability does not affect confidentiality and only has a low impact on integrity, the main concern is service disruption. Organizations relying on Ray for AI compute tasks, especially those exposing the dashboard to untrusted networks or the internet, face increased risk of drive-by attacks that can interrupt critical AI services. This could affect research, production AI systems, and cloud-based AI platforms. The ease of exploitation is limited by the need for network access or DNS rebinding, but no authentication or complex privileges are required, making it a significant risk in misconfigured environments.
Mitigation Recommendations
To mitigate CVE-2026-27482, organizations should immediately upgrade all Ray deployments to version 2.54.0 or later, where the vulnerability is fixed. Additionally, administrators should ensure that the dashboard and agent interfaces are not exposed to untrusted networks; bind the dashboard to localhost or internal IPs rather than 0.0.0.0. Implement network-level controls such as firewalls or VPNs to restrict access to the dashboard. Disable or restrict DELETE HTTP methods on the dashboard server if possible. Monitor network traffic for suspicious DELETE requests targeting the dashboard endpoints. Employ DNS rebinding protections in browsers and network infrastructure to prevent malicious web pages from exploiting this vector. Finally, review and harden authentication and authorization mechanisms for all management interfaces to prevent unauthenticated access.
Affected Countries
United States, China, Germany, United Kingdom, Japan, South Korea, India, Canada, France, Australia
CVE-2026-27482: CWE-396: Declaration of Catch for Generic Exception in ray-project ray
Description
Ray is an AI compute engine. In versions 2.53.0 and below, thedashboard HTTP server blocks browser-origin POST/PUT but does not cover DELETE, and key DELETE endpoints are unauthenticated by default. If the dashboard/agent is reachable (e.g., --dashboard-host=0.0.0.0), a web page via DNS rebinding or same-network access can issue DELETE requests that shut down Serve or delete jobs without user interaction. This is a drive-by availability impact. The fix for this vulnerability is to update to Ray 2.54.0 or higher.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27482 affects the Ray AI compute engine, specifically versions 2.53.0 and earlier. The vulnerability arises because the dashboard HTTP server blocks browser-origin POST and PUT requests but fails to block DELETE requests. Moreover, critical DELETE endpoints are unauthenticated by default, meaning that if the dashboard or agent is reachable on a network interface (for example, if launched with --dashboard-host=0.0.0.0), an attacker can send DELETE requests to the dashboard. These requests can shut down the Serve component or delete running jobs, causing denial of service. The attack vector includes DNS rebinding or direct same-network access, enabling a malicious web page or attacker on the local network to perform these actions without user authentication or explicit user interaction beyond visiting a malicious page. The vulnerability is classified under CWE-396, which relates to the declaration of catch for generic exceptions, indicating a design flaw in error handling or access control. The CVSS v3.1 score is 5.9 (medium), reflecting network attack vector, high attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality impact, low integrity impact, and high availability impact. The fix involves updating Ray to version 2.54.0 or later, where these endpoints are properly secured and DELETE requests are blocked or authenticated. No public exploits are known at this time, but the vulnerability poses a risk to availability in exposed deployments.
Potential Impact
The primary impact of CVE-2026-27482 is on availability. Attackers can remotely cause denial of service by shutting down the Serve component or deleting jobs managed by Ray’s dashboard without authentication. This can disrupt AI workloads, data processing pipelines, and any dependent services, potentially causing operational downtime and loss of computational progress. Since the vulnerability does not affect confidentiality and only has a low impact on integrity, the main concern is service disruption. Organizations relying on Ray for AI compute tasks, especially those exposing the dashboard to untrusted networks or the internet, face increased risk of drive-by attacks that can interrupt critical AI services. This could affect research, production AI systems, and cloud-based AI platforms. The ease of exploitation is limited by the need for network access or DNS rebinding, but no authentication or complex privileges are required, making it a significant risk in misconfigured environments.
Mitigation Recommendations
To mitigate CVE-2026-27482, organizations should immediately upgrade all Ray deployments to version 2.54.0 or later, where the vulnerability is fixed. Additionally, administrators should ensure that the dashboard and agent interfaces are not exposed to untrusted networks; bind the dashboard to localhost or internal IPs rather than 0.0.0.0. Implement network-level controls such as firewalls or VPNs to restrict access to the dashboard. Disable or restrict DELETE HTTP methods on the dashboard server if possible. Monitor network traffic for suspicious DELETE requests targeting the dashboard endpoints. Employ DNS rebinding protections in browsers and network infrastructure to prevent malicious web pages from exploiting this vector. Finally, review and harden authentication and authorization mechanisms for all management interfaces to prevent unauthenticated access.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-19T19:46:03.540Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69997b9dbe58cf853b7530e1
Added to database: 2/21/2026, 9:32:13 AM
Last enriched: 2/28/2026, 12:40:08 PM
Last updated: 4/7/2026, 3:00:59 PM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.