Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-7482 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Ollama < 0.17.1 has a **Heap Buffer Over-read** in GGUF model loading. πŸ“‰ **Consequences**: Memory leakage of env vars, API keys, prompts, and chat data.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-125 (Out-of-bounds Read). πŸ” **Flaw**: The loader accepts GGUF files with **invalid tensor offsets/sizes** exceeding file length.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: Ollama. πŸ“… **Affected**: Versions **prior to 0.17.1**. 🧩 **Components**: `/api/create` endpoint (loading) & `/api/push` endpoint (exfiltration).

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Read sensitive memory contents. πŸ—οΈ **Data Stolen**: Env vars, API keys, system prompts, user conversations. πŸ“€ **Exfil Method**: Upload crafted model to attacker-controlled registry via `/api/push`.

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: LOW. πŸ”“ **Auth**: Default endpoints `/api/create` & `/api/push` have **NO authentication**. 🌐 **Config**: Often bound to `0.0.0.0` (public internet), not just `127.0.0.1`.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exp?**: No PoCs listed in data. πŸ“‰ **Risk**: However, simple crafted GGUF files can trigger it. Wild exploitation likely easy due to lack of auth & simple buffer logic.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check Ollama version (< 0.17.1). 2. Scan for public exposure of port 11434. 3. Monitor for unusual `/api/create` or `/api/push` requests from unknown IPs.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes! πŸ“¦ **Patch**: Version **0.17.1**. πŸ”— **Ref**: PR #14406 ensures tensor size validity. Commit `88d57d0` fixes the issue. πŸ”„ **Action**: Upgrade immediately.

Q9What if no patch? (Workaround)

πŸ›‘οΈ **Workaround**: 1. **Bind to 127.0.0.1** only. 2. Implement **reverse proxy auth** (e.g., Nginx basic auth) for `/api/create` & `/api/push`. 3. Restrict network access.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: CRITICAL. 🚨 **Priority**: P1. CVSS **High** (AV:N, AC:L, PR:N, UI:N, C:H, A:H). Immediate patching required due to no-auth default config & sensitive data exposure.