Trend Micro Warns of Thousands of Exposed AI Servers
Latest research reveals mounting infrastructure-level risks from diverse components
To learn more about how network defenders and adversaries are using AI, read Trend Micro State of AI Security Report, 1H 2025: https://trendmicro.com/vinfo/us/security/news/trend-micro-state-of-ai-security-report-1h-2025
Trend's report highlights several AI-related security challenges:
1) Vulnerabilities/exploits in critical components
Organizations wishing to develop, deploy and use AI applications must leverage multiple specialized software components and frameworks, which may contain vulnerabilities one may find in regular software. The report reveals zero-day vulnerabilities and exploits in core components including ChromaDB, Redis, NVIDIA Triton, and NVIDIA Container Toolkit.
2) Accidental exposure to the internet
Vulnerabilities are often the result of rushed development and deployment timelines, as are instances when AI systems are accidentally exposed to the internet, where they can be probed by adversaries. As detailed in the report, Trend has found 200+ ChromaDB servers, 2,000 Redis servers, and 10,000+ Ollama servers exposed to the internet with no authentication.
3) Vulnerabilities in open-source components
Many AI frameworks and platforms use open-source software libraries to provide common functionality. However, open-source components often contain vulnerabilities that end up creeping into production systems, where they are hard to detect. At the recent Pwn2Own Berlin, which featured a new AI category, researchers uncovered an exploit for the Redis vector database, which stemmed from an outdated Lua component.
4) Container-based weaknesses
A great deal of AI infrastructure runs on containers, meaning it is exposed to the same security vulnerabilities and threats that impact cloud and container environments. As outlined in the report, Pwn2Own researchers were able to uncover an exploit for the NVIDIA Container Toolkit. Organizations should sanitize inputs and monitor runtime behavior to mitigate such risks.
Both the developer community and its customers must better balance security with time to market in order to mitigate the risks outlined above. Concrete steps could include:
- Improved patch management and vulnerability scans
- Maintaining an inventory of all software components, including third-party libraries and subsystems
- Container management security best practices, including using minimal base images and runtime security tools
- Configuration checks to ensure AI infrastructure components, like servers aren't exposed to the internet
About
View original content to download multimedia:https://www.prnewswire.com/news-releases/trend-micro-warns-of-thousands-of-exposed-ai-servers-302515794.html
SOURCE