Security Flaws in Popular ML Toolkits Enable Server Hijacks, Privilege Escalation

Share:

Cybersecurity researchers have uncovered nearly two dozen security flaws spanning 15 different machine learning (ML) related open-source projects.

These comprise vulnerabilities discovered both on the server- and client-side, software supply chain security firm JFrog said in an analysis published last week.

The server-side weaknesses “allow attackers to hijack important servers in the organization such as ML model registries, ML databases and ML pipelines,” it said.

The vulnerabilities, discovered in Weave, ZenML, Deep Lake, Vanna.AI, and Mage AI, have been broken down into broader sub-categories that allow for remotely hijacking model registries, ML database frameworks, and taking over ML Pipelines.

A brief description of the identified flaws is below –

  • CVE-2024-7340 (CVSS score: 8.8) – A directory traversal vulnerability in the Weave ML toolkit that allows for reading files across the whole filesystem, effectively allowing a low-privileged authenticated user to escalate their privileges to an admin role by reading a file named “api_keys.ibd” (addressed in version 0.50.8)
  • An improper access control vulnerability in the ZenML MLOps framework that allows a user with access to a managed ZenML server to elevate their privileges from a viewer to full admin privileges, granting the attacker the ability to modify or read the Secret Store (No CVE identifier)
  • CVE-2024-6507 (CVSS score: 8.1) – A command injection vulnerability in the Deep Lake AI-oriented database that allows attackers to inject system commands when uploading a remote Kaggle dataset due to a lack of proper input sanitization (addressed in version 3.9.11)
  • CVE-2024-5565 (CVSS score: 8.1) – A prompt injection vulnerability in the Vanna.AI library that could be exploited to achieve remote code execution on the underlying host
  • CVE-2024-45187 (CVSS score: 7.1) – An incorrect privilege assignment vulnerability that allows guest users in the Mage AI framework to remotely execute arbitrary code through the Mage AI terminal server due to the fact that they have been assigned high privileges and remain active for a default period of 30 days despite deletion
  • CVE-2024-45188, CVE-2024-45189, and CVE-2024-45190 (CVSS scores: 6.5) – Multiple path traversal vulnerabilities in Mage AI that allow remote users with the “Viewer” role to read arbitrary text files from the Mage server via “File Content,” “Git Content,” and “Pipeline Interaction” requests, respectively

“Since MLOps pipelines may have access to the organization’s ML Datasets, ML Model Training and ML Model Publishing, exploiting an ML pipeline can lead to an extremely severe breach,” JFrog said.

“Each of the attacks mentioned in this blog (ML Model backdooring, ML data poisoning, etc.) may be performed by the attacker, depending on the MLOps pipeline’s access to these resources.

The disclosure comes over two months after the company uncovered more than 20 vulnerabilities that could be exploited to target MLOps platforms.

It also follows the release of a defensive framework codenamed Mantis that leverages prompt injection as a way to counter cyber attacks Large language models (LLMs) with more than over 95% effectiveness.

“Upon detecting an automated cyber attack, Mantis plants carefully crafted inputs into system responses, leading the attacker’s LLM to disrupt their own operations (passive defense) or even compromise the attacker’s machine (active defense),” a group of academics from the George Mason University said.

“By deploying purposefully vulnerable decoy services to attract the attacker and using dynamic prompt injections for the attacker’s LLM, Mantis can autonomously hack back the attacker.”

Ravie Lakshmanan

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:05 am, Jul 1, 2025
weather icon 29°C
L: 27° | H: 30°
overcast clouds
Humidity: 56 %
Pressure: 1013 mb
Wind: 5 mph E
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 96%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:47 am
Sunset: 9:20 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
27° | 30°°C 0 mm 0% 10 mph 61 % 1014 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
18° | 22°°C 1 mm 100% 10 mph 88 % 1023 mb 0 mm/h
Thu Jul 03 10:00 pm
weather icon
13° | 26°°C 0 mm 0% 9 mph 56 % 1029 mb 0 mm/h
Fri Jul 04 10:00 pm
weather icon
15° | 26°°C 0 mm 0% 9 mph 50 % 1028 mb 0 mm/h
Sat Jul 05 10:00 pm
weather icon
16° | 23°°C 1 mm 100% 14 mph 93 % 1021 mb 0 mm/h
Today 1:00 pm
weather icon
29° | 30°°C 0 mm 0% 7 mph 48 % 1013 mb 0 mm/h
Today 4:00 pm
weather icon
31° | 33°°C 0 mm 0% 10 mph 34 % 1012 mb 0 mm/h
Today 7:00 pm
weather icon
31° | 31°°C 0 mm 0% 10 mph 33 % 1012 mb 0 mm/h
Today 10:00 pm
weather icon
23° | 23°°C 0 mm 0% 8 mph 61 % 1014 mb 0 mm/h
Tomorrow 1:00 am
weather icon
20° | 20°°C 0 mm 0% 6 mph 70 % 1015 mb 0 mm/h
Tomorrow 4:00 am
weather icon
19° | 19°°C 0 mm 0% 5 mph 79 % 1016 mb 0 mm/h
Tomorrow 7:00 am
weather icon
18° | 18°°C 0 mm 0% 6 mph 76 % 1016 mb 0 mm/h
Tomorrow 10:00 am
weather icon
22° | 22°°C 0 mm 0% 4 mph 62 % 1016 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€90,578.07
-0.75%
Ethereum(ETH)
€2,083.10
-0.66%
Tether(USDT)
€0.85
0.00%
XRP(XRP)
€1.88
1.42%
Solana(SOL)
€126.72
-0.32%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.136658
-2.66%
Shiba Inu(SHIB)
€0.000009
-2.05%
Pepe(PEPE)
€0.000008
-3.38%
Scroll to Top