Security

CSO

'Thousands' of businesses at mercy of miscreants thanks to unpatched Ray AI flaw

Anyscale claims issue is 'long-standing design decision' – as users are raided by intruders


Thousands of companies remain vulnerable to a remote-code-execution bug in Ray, an open-source AI framework used by Amazon, OpenAI, and others, that is being abused by miscreants in the wild to steal sensitive data and illicitly mine for cryptocurrency.

This is according to Oligo Security, which dubbed the unpatched vulnerability ShadowRay. The oversight is tracked as CVE-2023-48022, with a critical 9.8 out of 10 CVSS severity rating.

On Tuesday the security shop's Avi Lumelsky, Guy Kaplan, and Gal Elbaz warned that the flaw has been under active exploitation for the past seven months, with criminals using it to compromise medical and video analytics businesses, educational institutes, and others that use the machine-learning software.

"Researchers at Oligo Security have observed instances of CVE-2023-48022 being actively exploited in the wild, making the disputed CVE a 'shadow vulnerability' — a CVE that doesn't show up in static scans but can still lead to breaches and significant losses," the trio wrote.

Ray is a popular open source project overseen by Anyscale, and is used to develop and scale Python-based applications that incorporate machine-learning workloads.

Berenice Flores at Bishop Fox, Sierra Haex, and Protect AI disclosed CVE-2023-48022, which exists because of Ray's lack of authorization in its job submission API, to the project's maintainers last year. They also alerted Anyscale about four other flaws, CVE-2023-6019, CVE-2023-6020, CVE-2023-6021 and CVE-2023-48023, all of which were fixed in November as part of  Ray 2.8.1.

At the time, Anyscale said CVE-2023-48022 wasn't a bug, but rather a "long-standing design decision based on how Ray's security boundaries are drawn and consistent with Ray deployment best practices."

Essentially, the jobs submission API performs, by default, no checks for authorization, allowing anyone who can reach the endpoint to add and remove work, access information, and perform other things they really shouldn't be able to. Anyscale says this service should be placed behind some kind of protection to prevent that from happening; people deploying the software probably don't realize that and end up exposing the API to the world for miscreants to abuse.

And as such, organizations have been hit by cyber-crooks exploiting the CVE.

The project's maintainers did, however, say they planned to offer authentication in a future version of the open-source framework. But, as of now, the vulnerability still allows remote attackers to execute code via the job submission API in Ray 2.6.3 and 2.8.0. 

We asked Anyscale what the current state of play is with CVE-2023-48022, and a spokesperson assured us the biz is on the case: "We are currently working on a script that will make it easy for users to verify their configuration and avoid accidental exposure. Additionally, we have notified all Anyscale customers of the vulnerability and that they are not affected."

This CVE has led to a "trove" of sensitive data being leaked by compromised servers, we're told. This includes OpenAI, Stripe, Slack, and database credentials, and on some machines attackers could use this access to encrypt data stores using ransomware. To be clear, it's not that OpenAI and co are vulnerable, it's that Ray AI's API can be abused to grab creds for those services from organizations' vulnerable machines.

The Oligo lot also said they saw evidence that miscreants had stolen password hashes and private SSH keys via the flaw. Because many of the compromised vulnerable deployments ran with root privileges, the flaw also gave attackers access to victims' entire cloud environments and other services running in AWS, Google, and Microsoft Azure.

Plus, these hijacked clusters are also being abused for cryptocurrency mining, according to Oglio. Most of these nodes have powerful GPUs, which allow attackers to mine coins at the victim organization's expense. 

"In other words, attackers choose to compromise these machines not only because they can obtain valuable sensitive information, but because GPUs are very expensive and difficult to obtain, especially these days," the trio said, noting that the on-demand GPU costs in AWS can run to $858,480 a year, per machine. ®

Send us news
14 Comments

AI-pushing Adobe says AI-shy office workers will love AI if it saves them time

knowledge workers, overwhelmed by knowledge tasks? We know what you need

Canadian artist wants Anthropic AI lawsuit corrected

Tim Boucher objects to the mischaracterization of his work in authors' copyright claim

AI firms propose 'personhood credentials' … to fight AI

It's going to take more than CAPTCHA to prove you're real

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Uncle Sam charges Russian GRU cyber-spies behind 'WhisperGate intrusions'

Feds post $10M bounty for each of the six's whereabouts

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised

GPT apps fail to disclose data collection, study finds

Researchers say that implementing Actions omit privacy details and expose info

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

White House seizes 32 domains, issues criminal charges in massive election-meddling crackdown

Russia has seemingly decided who it wants Putin the Oval Office

Slack AI can be tricked into leaking data from private channels via prompt injection

Whack yakety-yak app chaps rapped for security crack