Miggo Logo

CVE-2024-8768:
vLLM denial of service vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.16939%
Published
9/17/2024
Updated
9/17/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
vllmpip< 0.5.50.5.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The root cause was the lack of input validation in LLMEngine's request processing path (_add_processed_request), which allowed empty prompts to reach the scheduler. The scheduler's _get_num_new_tokens method then triggered an assertion on zero tokens, causing a crash. The high-confidence vulnerable function is the unpatched _add_processed_request, while the medium-confidence scheduler function represents the exploitable assertion (CWE-617). The commit added validation in LLMEngine to prevent empty prompts from reaching the assertion.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *l*w w*s *oun* in t** vLLM li*r*ry. * *ompl*tions *PI r*qu*st wit* *n *mpty prompt will *r*s* t** vLLM *PI s*rv*r, r*sultin* in * **ni*l o* s*rvi**.

Reasoning

T** root **us* w*s t** l**k o* input v*li**tion in LLM*n*in*'s r*qu*st pro**ssin* p*t* (_***_pro**ss**_r*qu*st), w*i** *llow** *mpty prompts to r**** t** s****ul*r. T** s****ul*r's _**t_num_n*w_tok*ns m*t*o* t**n tri***r** *n *ss*rtion on z*ro tok*ns