WARNING: A VULNERABILITY IN META LLAMA STACK CAN BE EXPLOITED FOR REMOTE CODE EXECUTION. PATCH IMMEDIATELY!

Image
Decorative image
Gepubliceerd : 27/01/2025

Reference:
Advisory #2025-020

Version:
1.0

Affected software:
Meta Llama Stack

Type:
Remote code execution

CVE/CVSS:
CVE-2024-50050
CVSS 6.3 (CVSS:3.0/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

Sources

Risks

In January 2025, Meta addressed a critical vulnerability in the Llama Stack, otherwise known as meta-llama or llama-stack. CVE-2024-50050 can be exploited to execute arbitrary code on servers running the Llama Stack framework. Having full control over the server, a threat actor could steal data and tamper with AI models.
Llama Stack is an open-source framework developed by Meta to streamline the development and deployment of GenAI applications. Llama is backed by some of the biggest actors in the AI ecosystem such as AWS, Groq, NVIDIA, Ollama, TogetherAI, and Dell.
There is no information as to active exploitation at this time (cut-off date: 27 January 2025). However, a proof of concept is publicly available.
According to the National Vulnerability Database, exploitation of this vulnerability can have a low impact on confidentiality, integrity, and availability. However, this assessment may change once this vulnerability is no longer awaiting analysis from NVD. Other organisations rated CVE-2024-50050 with a critical CVSSv3.1 of 9.3.

Description

CVE-2024-50050 is a Deserialization of Untrusted Data vulnerability in the Llama Stack. The flaw resides in a Python method, recv_pyobj, used in the default Python inference server of the Llama-stack framework. Attackers exploiting this vulnerability can send maliciously crafted data to a Llama-stack server. When the server deserializes this data using recv_pyobj, it executes the attacker’s commands, potentially allowing full control over the server.

Please note that CVE-2024-50050 is rooted in the default inference implementation; it does not affect partner integrations.

Recommended Actions

Patch

The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.

Meta recommends upgrading to the most recent version.

 

Monitor/Detect

The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.

In case of an intrusion, you can report an incident via: https://notif.safeonweb.be/.

While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.

References