• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new hugging face vulnerability exposes ai models to supply chain

New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks

You are here: Home / General Cyber Security News / New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks
February 27, 2024

Cybersecurity scientists have identified that it’s doable to compromise the Hugging Deal with Safetensors conversion assistance to eventually hijack the designs submitted by customers and end result in source chain attacks.

“It can be achievable to deliver malicious pull requests with attacker-managed facts from the Hugging Face company to any repository on the platform, as effectively as hijack any types that are submitted by way of the conversion company,” HiddenLayer explained in a report published past week.

This, in switch, can be attained applying a hijacked product that’s intended to be transformed by the company, thereby letting malicious actors to request changes to any repository on the platform by masquerading as the conversion bot.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Hugging Confront is a popular collaboration system that aids people host pre-qualified device studying products and datasets, as well as establish, deploy, and teach them.

Safetensors is a format devised by the enterprise to retailer tensors preserving security in brain, as opposed to pickles, which has been probable weaponized by risk actors to execute arbitrary code and deploy Cobalt Strike, Mythic, and Metasploit stagers.

Cybersecurity

It also arrives with a conversion assistance that allows consumers to change any PyTorch model (i.e., pickle) to its Safetensor equal through a pull request.

HiddenLayer’s examination of this module found that it is really hypothetically feasible for an attacker to hijack the hosted conversion assistance employing a destructive PyTorch binary and compromise the technique hosting it.

What is actually much more, the token affiliated with SFConvertbot – an official bot designed to crank out the pull request – could be exfiltrated to deliver a destructive pull ask for to any repository on the internet site, main to a state of affairs where a menace actor could tamper with the model and implant neural backdoors.

“An attacker could run any arbitrary code any time a person attempted to convert their model,” scientists Eoin Wickens and Kasimir Schulz pointed out. “With no any sign to the consumer by themselves, their versions could be hijacked on conversion.”

Ought to a person attempt to convert their own private repository, the attack could pave the way for the theft of their Hugging Facial area token, accessibility or else inside types and datasets, and even poison them.

Complicating issues even more, an adversary could acquire benefit of the truth that any person can submit a conversion ask for for a public repository to hijack or alter a broadly utilized model, potentially resulting in a appreciable supply chain risk.

“In spite of the greatest intentions to protected equipment discovering types in the Hugging Facial area ecosystem, the conversion services has proven to be susceptible and has had the potential to cause a popular supply chain attack via the Hugging Confront official assistance,” the researchers explained.

Cybersecurity

“An attacker could obtain a foothold into the container functioning the provider and compromise any design converted by the company.”

The development comes a tiny about a thirty day period immediately after Trail of Bits disclosed LeftoverLocals (CVE-2023-4969, CVSS score: 6.5), a vulnerability that allows recovery of knowledge from Apple, Qualcomm, AMD, and Creativeness normal-reason graphics processing models (GPGPUs).

The memory leak flaw, which stems from a failure to adequately isolate approach memory, permits a neighborhood attacker to examine memory from other procedures, such as another user’s interactive session with a substantial language model (LLM).

“This information leaking can have significant security repercussions, especially given the rise of ML units, where by local memory is made use of to keep product inputs, outputs, and weights,” security scientists Tyler Sorensen and Heidy Khlaaf reported.

Uncovered this post interesting? Comply with us on Twitter  and LinkedIn to examine much more distinctive information we article.


Some pieces of this article are sourced from:
thehackernews.com

Previous Post: «wordpress plugin alert critical sqli vulnerability threatens 200k+ websites WordPress Plugin Alert – Critical SQLi Vulnerability Threatens 200K+ Websites
Next Post: Five Eyes Agencies Expose APT29’s Evolving Cloud Attack Tactics five eyes agencies expose apt29's evolving cloud attack tactics»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.