CVE-2024-37032: Ollama: path traversal enables RCE via model blob API
HIGH ACTIVELY EXPLOITED PoC AVAILABLEOllama before 0.1.34 contains a path traversal flaw (CWE-22) in its model blob API that enables remote code execution with low privileges and no user interaction required. Any team running Ollama—locally or network-exposed—must upgrade to 0.1.34+ immediately. If Ollama is accessible beyond localhost, treat it as potentially compromised and audit access logs for '../' patterns in blob requests.
Risk Assessment
High risk (CVSS 8.8). Network-accessible, low-complexity, no user interaction required—trivially exploitable by any user with API access. Ollama's default port (11434) is frequently left open on internal networks or exposed externally in development environments. A public exploit write-up ('Probllama' via Vicarius) is available, materially lowering the bar for exploitation. No active KEV listing, but public PoC makes exploitation highly likely.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| ollama | pip | — | No patch |
Do you use ollama? You're affected.
Severity & Risk
Attack Surface
Recommended Action
1 step-
1) Upgrade Ollama to 0.1.34+ immediately—this is the only complete fix. 2) If patching is delayed, restrict API to localhost by binding to 127.0.0.1 and block port 11434 at the network perimeter. 3) Run Ollama in a container with a read-only root filesystem and minimal volume mounts to limit blast radius. 4) Search access logs for blob path requests where the digest field contains '../' or strings not matching the pattern [a-f0-9]{64}. 5) Audit who has network access to Ollama—by default it has no authentication layer.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2024-37032?
Ollama before 0.1.34 contains a path traversal flaw (CWE-22) in its model blob API that enables remote code execution with low privileges and no user interaction required. Any team running Ollama—locally or network-exposed—must upgrade to 0.1.34+ immediately. If Ollama is accessible beyond localhost, treat it as potentially compromised and audit access logs for '../' patterns in blob requests.
Is CVE-2024-37032 actively exploited?
Yes, CVE-2024-37032 is confirmed actively exploited and listed in CISA Known Exploited Vulnerabilities catalog.
How to fix CVE-2024-37032?
1) Upgrade Ollama to 0.1.34+ immediately—this is the only complete fix. 2) If patching is delayed, restrict API to localhost by binding to 127.0.0.1 and block port 11434 at the network perimeter. 3) Run Ollama in a container with a read-only root filesystem and minimal volume mounts to limit blast radius. 4) Search access logs for blob path requests where the digest field contains '../' or strings not matching the pattern [a-f0-9]{64}. 5) Audit who has network access to Ollama—by default it has no authentication layer.
What systems are affected by CVE-2024-37032?
This vulnerability affects the following AI/ML architecture patterns: local LLM inference, model serving, agent frameworks, self-hosted LLM APIs, AI development environments.
What is the CVSS score for CVE-2024-37032?
CVE-2024-37032 has a CVSS v3.1 base score of 8.8 (HIGH). The EPSS exploitation probability is 93.75%.
Technical Details
NVD Description
Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
Exploitation Scenario
An attacker with network access to Ollama's API (default port 11434) crafts a request to the blob endpoint using a malformed digest containing a path traversal sequence—e.g., 'sha256:../../../etc/cron.d/pwned'. Since Ollama does not validate the digest format, it resolves this to an arbitrary filesystem path. The attacker writes a cron job, an SSH authorized_keys entry, or a reverse shell payload to the host, achieving persistent access to the machine running the LLM inference server. In enterprise environments, this host often has broad internal network access and stores sensitive model weights or API credentials.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References
- github.com/ollama/ollama/blob/adeb40eaf29039b8964425f69a9315f9f1694ba8/server/modelpath_test.go Product
- github.com/ollama/ollama/compare/v0.1.33...v0.1.34 Release
- github.com/ollama/ollama/pull/4175 Issue
- vicarius.io/vsociety/posts/probllama-in-ollama-a-tale-of-a-yet-another-rce-vulnerability-cve-2024-37032 Exploit 3rd Party
- github.com/0o-de-lally/inferno Exploit
- github.com/20142995/nuclei-templates Exploit
- github.com/Bi0x/CVE-2024-37032 Exploit
- github.com/Catgirls-Corporation/ollama_on-prem Exploit
- github.com/Hatcat123/my_stars Exploit
- github.com/J1ezds/Vulnerability-Wiki-page Exploit
- github.com/Mr-xn/Penetration_Testing_POC Exploit
- github.com/Ostorlab/KEV Exploit
- github.com/ParisNeo/ollama_proxy_server Exploit
- github.com/Threekiii/Awesome-POC Exploit
- github.com/Threekiii/CVE Exploit
- github.com/XiaomingX/awesome-poc-for-red-team Exploit
- github.com/a1batr0ssG/VulhubExpand Exploit
- github.com/ahboon/CVE-2024-37032-scanner Exploit
- github.com/badboy0/Ollama_Exploit_Tool Exploit
- github.com/dansarmiento/ollama_sql_runner Exploit
- github.com/honysyang/eleaipoc Exploit
- github.com/lucky-tensor/inferno Exploit
- github.com/nomi-sec/PoC-in-GitHub Exploit
- github.com/pankass/CVE-2024-37032_CVE-2024-45436 Exploit
- github.com/plzheheplztrying/cve_monitor Exploit
- github.com/tanjiti/sec_profile Exploit
- github.com/wowtalon/LLM-Security Exploit
Timeline
Related Vulnerabilities
CVE-2025-63389 9.8 ollama: Missing Auth allows unauthenticated access
Same package: ollama CVE-2026-7482 9.1 Ollama: heap OOB read leaks API keys and chat data
Same package: ollama CVE-2026-44007 9.1 vm2: sandbox escape via nesting:true enables RCE
Same package: ollama CVE-2024-39720 8.2 Ollama: OOB read in GGUF parser enables remote DoS
Same package: ollama CVE-2024-45436 7.5 Ollama: ZIP path traversal exposes host filesystem
Same package: ollama
AI Threat Alert