<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Configuration on Digitaliziran si</title><link>https://digitaliziran.si/categories/configuration/</link><description>Recent content in Configuration on Digitaliziran si</description><generator>Hugo</generator><language>en</language><lastBuildDate>Fri, 05 Sep 2025 16:40:51 +0000</lastBuildDate><atom:link href="https://digitaliziran.si/categories/configuration/index.xml" rel="self" type="application/rss+xml"/><item><title>Your LLM Servers Are Exposed: Cisco's Shodan Study Reveals Critical Security Gaps</title><link>https://digitaliziran.si/2025/09/05/your-llm-servers-are-exposed-ciscos-shodan-study-reveals-critical-security-gaps/</link><pubDate>Fri, 05 Sep 2025 16:40:51 +0000</pubDate><guid>https://digitaliziran.si/2025/09/05/your-llm-servers-are-exposed-ciscos-shodan-study-reveals-critical-security-gaps/</guid><description>&lt;p&gt;Are your organization&amp;rsquo;s &lt;a href="https://en.wikipedia.org/wiki/Large_language_model"&gt;Large Language Model (LLM)&lt;/a&gt; servers broadcasting sensitive information to the entire internet? A new &lt;a href="https://blogs.cisco.com/security/detecting-exposed-llm-servers-shodan-case-study-on-ollama"&gt;Cisco security study&lt;/a&gt; using &lt;a href="https://www.shodan.io/"&gt;Shodan search engine&lt;/a&gt; data reveals a troubling reality: thousands of &lt;a href="https://ollama.ai/"&gt;Ollama&lt;/a&gt; LLM servers are running with misconfigured settings, creating potential entry points for attackers.&lt;/p&gt;
&lt;h2 id="the-scale-of-exposure"&gt;The Scale of Exposure&lt;/h2&gt;
&lt;p&gt;Cisco&amp;rsquo;s research team discovered numerous Ollama servers - a popular platform for running LLMs locally - exposed to the internet without proper security controls. However, it&amp;rsquo;s important to understand that &lt;strong&gt;Ollama is designed with secure defaults&lt;/strong&gt;. By default, &lt;a href="https://github.com/ollama/ollama/issues/11941"&gt;Ollama binds only to localhost (127.0.0.1)&lt;/a&gt;, restricting access to the local machine only. The exposures identified by Cisco&amp;rsquo;s research occur when administrators deliberately override these secure defaults by setting the &lt;code&gt;OLLAMA_HOST&lt;/code&gt; environment variable to &lt;code&gt;0.0.0.0&lt;/code&gt; to enable remote access, but fail to implement proper security measures.&lt;/p&gt;</description></item></channel></rss>