Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (sysdig.com) LMDeploy SSRF Vulnerability CVE-2026-33626 Exploited Within Hours of Disclosure Against AI Inference Infrastructure

(sysdig.com) LMDeploy SSRF Vulnerability CVE-2026-33626 Exploited Within Hours of Disclosure Against AI Inference Infrastructure

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (sysdig.com) LMDeploy SSRF Vulnerability CVE-2026-33626 Exploited Within Hours of Disclosure Against AI Inference Infrastructure

    New SSRF in LMDeploy (CVE-2026-33626) exploited 12h31m post-disclosure against AI inference infra. Attacker scanned AWS IMDS, Redis, MySQL, and admin endpoints via crafted image_url in /v1/chat/completions. OOB DNS to requestrepo.com confirmed blind SSRF.

    In brief - A critical SSRF in LMDeploy, used for vision-language models, was weaponized within hours of disclosure. Attackers targeted cloud metadata, internal services, and inference clusters, highlighting rapid exploitation of AI infrastructure vulnerabilities.

    Technically - CVE-2026-33626 stems from missing hostname validation in LMDeploy’s image URL loader. Attacker sent POST requests with SSRF payloads to 169.254.169.254 (IMDS), 127.0.0.1:6379/3306/8080, and /distserve/p2p_drop_connect. Detection via Falco rules for IMDS contact; remediation requires LMDeploy v0.12.3, IMDSv2 with httpTokens=required, and VPC egress controls.

    Source: https://webflow.sysdig.com/blog/cve-2026-33626-how-attackers-exploited-lmdeploy-llm-inference-engines-in-12-hours

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups