Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Artificial Intelligence

Critical Bug Could Expose 300,000 Ollama Deployments to Information Theft

Dubbed Bleeding Llama, the heap out-of-bounds read issue can be exploited remotely, without authentication.

Llama Ollama vulnerability

Roughly 300,000 Ollama deployments are prone to sensitive information theft through a remotely exploitable, unauthenticated critical vulnerability, Cyera warns.

Ollama is an open source solution for running LLMs on local machines and is highly popular among organizations as a self-hosted AI inference engine.

A heap out-of-bounds read issue in Ollama could be exploited to access sensitive information stored on the heap, including prompts, messages, and environment variables, including API keys, tokens, and secrets, Cyera says.

Tracked as CVE-2026-7482 (CVSS score of 9.3) and dubbed Bleeding Llama, the bug affects the GGUF model loader, which accepts an attacker-supplied GGUF file containing a declared tensor offset and size larger than the file’s length.

When processing the file, the sensor reads past the allocated heap buffer, accessing memory that may contain sensitive information.

“The attacker then leverages Ollama’s built-in model push feature to exfiltrate the resulting file – complete with stolen heap data – to an attacker-controlled server. The entire attack requires only three unauthenticated API calls,” Cyera says.

Advertisement. Scroll to continue reading.

The cybersecurity firm explains that Ollama launches by default without authentication, and that it listens to all network interfaces, meaning that all internet-accessible instances are prone to exploitation.

“With approximately 300,000 Ollama servers currently exposed on the public internet, this vulnerability is immediately and broadly exploitable – no credentials required,” Cyera warns.

Depending on how Ollama is used, successful exploitation of Bleeding Llama could expose employee interactions, development code, routed tool outputs, and prompts containing PII, PHI, and other sensitive information.

According to Cyera, “any deployment where Ollama is network-accessible without a firewall or authentication proxy in front of it” is at risk of exploitation.

The vulnerability was addressed in Ollama version 0.17.1. Organizations are advised to apply the fix as soon as possible and restrict network access to their deployments. Deploying an authentication proxy and network segmentation should improve security.

Organizations should also audit running instances for internet exposure and consider any instance accessible from the internet, as well as the environment variables and data passing through it, to be compromised.

Related: MetInfo, Weaver E-cology Vulnerabilities in Attackers’ Crosshairs

Related: WhatsApp Discloses File Spoofing, Arbitrary URL Scheme Vulnerabilities

Related: Firefox Vulnerability Allows Tor User Fingerprinting

Related: Apple Patches iOS Flaw Allowing Recovery of Deleted Chats

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Jacki Monson has joined CVS Health as SVP, Deputy CISO.

Gigi Schumm has been promoted to Chief Revenue Officer at Securonix.

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.