In brief Almost as quickly as a paper came out last week revealing an AI side-channel vulnerability, Cloudflare researchers have figured out how to solve it: just obscure your token size.
The paper [PDF], from researchers at the Offensive AI Institute at Israel's Ben Gurion University, found an issue with how all non-Google ChatGPT derivatives transmit chat sessions between LLM servers and users.
When operating in streaming mode, ChatGPT and related AIs send tokens sequentially - meaning the response from the AI flows bit-by-bit to the user instead of all at once after the bot has decided how to answer.
A malicious actor in the middle with the ability to intercept network traffic could sniff those LLM tokens.
You may be thinking that those response tokens are encrypted, and you'd be right.
Here's where the Ben Gurion researchers got crafty: they built their own specially trained LLMs designed to examine the packets and understand what they mean, with a decent degree of accuracy.
Cloudflare, offers its own ChatGPT-based AIs in the form of products like Workers AI and AI Gateway, seems to have figured out how to address the issue with relative ease by padding its tokens.
Another Patch Tuesday, another quiet week on the vulnerability front - at least from the major vendors, whose issues were already highlighted on The Register.
A few operational tech vulnerabilities emerged and, as has been established, that's where the big threats lie nowadays.
CVSS 10.0 - Multiple CVEs: Siemens Cerberus and Sinteso fire protection systems contain a number of issues, including a rather serious classic buffer overflow vulnerability, that could allow access to fire protection system networks.
CVSS 9.8 - Multiple CVEs: A number of Mitsubishi Electric MELSEC-Q/L series controllers contain incorrect pointer scaling and integer overflow/wraparound issues that could allow an attacker to read arbitrary info or perform RCE. CVSS 9.8 - Multiple CVEs: Siemens RUGGEDCOM APE1808 devices, which use Fortinet, are suffering from a bunch of issues linked to problems with FortiOS, FortiProxy and other well-perforated products.
CVSS 9.8 - Too many CVEs: Siemens SIMATIC RF160B RFID readers versions prior to 2.2 contain 157 CVEs that let an attacker execute arbitrary code with privileged access.
CVSS 9.8 - Multiple CVEs: Siemens SINEMA remote connect server is vulnerable to XSS and is improperly controlling access.
CVSS 8.8 - Multiple CVEs: Delta Electronics DIAEnergie software prior to v1.10.00.005 contains several SQL injection vulnerabilities and other issues that could let an attacker escalate privileges, disclose information or disrupt systems.
CVSS 8.7 - Multiple CVEs: More vulns in Siemens RUGGEDCOM APE1808, again due to the inclusion of Fortinet, this time with problems in Fortinet Next-Gen Firewall that could lead to DoS and RCE with elevated permissions.
Infostealer malware is everywhere nowadays, and a new campaign is trying to lure Roblox users into downloading one disguised as a tool to optimize frames-per-second performance on the platform.
Once installed, the malicious app uses Powershell commands to install the malware, which is able to exfiltrate location data, Wi-Fi network information, passwords, Roblox user data and even in-game currency details.
With the majority of Roblox users being children, parents should be aware of the threat posed by such malware - especially if kids are playing around on a machine also used for business.
Jonathan Katz, a former manager at an unnamed telecom store in New Jersey, pled guilty this week to conspiring to gain unauthorized access to a protected computer by performing SIM swaps for someone else.
According to the US Department of Justice, while manager of the store Katz used his access to company computers to swap customer SIM numbers, giving account access to an unnamed co-conspirator who was able to access the victims' email, social media and cryptocurrency accounts.
This Cyber News was published on go.theregister.com. Publication date: Mon, 18 Mar 2024 03:13:08 +0000