Ollama is an open-source toolkit for large language models, but an unauthenticated access vulnerability on the default port 11434 can expose sensitive API endpoints to the public internet.
The vulnerability allows attackers to access private models, cause resource abuse, or even execute remote code, posing serious risks like data theft and server compromise.
Changing Ollama's default settings to enable remote access without authentication can lead to significant security flaws, including the CVE-2024-37032 path traversal issue for remote code execution.
Mitigation steps include restricting public access, implementing access control via firewall rules or a reverse proxy like NGINX with basic auth, and updating to fixed versions like v0.1.34.
All Ollama versions are vulnerable if exposed to 0.0.0.0 without authentication, with related flaws addressed in v0.1.34. The issue has been observed being exploited in real-world scenarios.