CVE-2024-12777

5.9 MEDIUM

📋 TL;DR

This vulnerability in aimhubio/aim version 3.25.0 allows attackers to cause denial of service by exploiting the sshfs-client's lack of timeout settings. The single-threaded tracking server can be made unresponsive by requesting connections to unresponsive sockets, preventing legitimate requests. Organizations using aim for ML experiment tracking with sshfs functionality are affected.

💻 Affected Systems

Products:
  • aimhubio/aim
Versions: Version 3.25.0 specifically
Operating Systems: All platforms running aim
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments using sshfs functionality with the tracking server. The vulnerability requires the sshfs-client feature to be utilized.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete unavailability of the aim tracking server, disrupting ML experiment monitoring and data collection until manual intervention restarts the service.

🟠

Likely Case

Intermittent service degradation where the aim server becomes temporarily unresponsive to legitimate requests, requiring administrator attention.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring that can detect and alert on service unavailability quickly.

🌐 Internet-Facing: MEDIUM - While exploitation requires specific conditions, internet-facing aim servers with sshfs enabled could be targeted by DoS attacks.
🏢 Internal Only: LOW - Internal exploitation would require network access and knowledge of the aim deployment, making accidental or malicious exploitation less likely.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the aim tracking server and knowledge of sshfs endpoints. No authentication is needed to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.25.1 or later

Vendor Advisory: https://huntr.com/bounties/cdf8db79-c290-4fe5-9383-4c518bfba4a8

Restart Required: Yes

Instructions:

1. Update aim using pip: 'pip install --upgrade aim==3.25.1' 2. Restart the aim tracking server service 3. Verify the version with 'aim --version'

🔧 Temporary Workarounds

Network segmentation

linux

Restrict network access to aim tracking server ports to trusted sources only

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport [aim_port] -s [trusted_ip] -j ACCEPT
iptables -A INPUT -p tcp --dport [aim_port] -j DROP

Disable sshfs functionality

all

If sshfs is not required, disable or remove sshfs-client usage in aim configuration

Modify aim configuration to remove sshfs endpoints or disable sshfs integration

🧯 If You Can't Patch

  • Implement network monitoring to detect aim server unresponsiveness and alert administrators
  • Deploy aim behind a reverse proxy with timeout settings and request limiting capabilities

🔍 How to Verify

Check if Vulnerable:

Check aim version: if version is exactly 3.25.0 and sshfs functionality is enabled, the system is vulnerable

Check Version:

aim --version

Verify Fix Applied:

Verify aim version is 3.25.1 or later using 'aim --version' command

📡 Detection & Monitoring

Log Indicators:

  • Extended hang times in aim server logs
  • Timeout errors related to sshfs connections
  • Increased error rates from aim tracking server

Network Indicators:

  • Unusual connection patterns to aim sshfs endpoints
  • Increased TCP connections to aim server without completion

SIEM Query:

source="aim.log" AND ("sshfs" AND "timeout" OR "hang" OR "unresponsive")

🔗 References

📤 Share & Export