{"id":21124,"date":"2024-07-03T11:54:49","date_gmt":"2024-07-03T18:54:49","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=21124"},"modified":"2024-10-22T09:49:28","modified_gmt":"2024-10-22T16:49:28","slug":"bringing-in-the-bom-squad-part-2-ai-ml-libraries-and-the-vulnerabilities-within","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/bringing-in-the-bom-squad-part-2-ai-ml-libraries-and-the-vulnerabilities-within\/","title":{"rendered":"Bringing in the BoM Squad, Part 2: AI\/ML Libraries and the Vulnerabilities Within"},"content":{"rendered":"\t\t
One of the most pressing concerns in AI security is the presence of vulnerabilities within AI\/ML libraries. These libraries are the building blocks for developing sophisticated AI models and applications, but can harbor critical security flaws that, if exploited, could have severe consequences, for example:\u00a0<\/span><\/p> Both of these vulnerabilities could create pathways for attackers to compromise AI systems. Understanding and managing these vulnerabilities is essential for maintaining a robust AI security posture.<\/span><\/p> We combined our AIBoM research with Securin Vulnerability Intelligence to bring a comprehensive and proactive approach to identifying, analyzing and mitigating vulnerabilities in AI\/ML libraries, enhancing the security posture and resilience of AI-driven systems.\u00a0 Here\u2019s how we did it.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t In our <\/span>previous blog<\/span><\/a>, we detailed the generation and construction of an AI Bill of Materials (AIBoM) across ~500k Models in the Hugging Face repository. The programming libraries and packages that form the foundation of AI and ML development are a crucial element of our AIBoMs, providing essential tools and functionalities for building, training and deploying intelligent models and applications. We identified 3000+ libraries and ranked them by their frequency, noting expected guests such as:<\/span><\/p> Categorizing AI\/ML libraries helps streamline the selection process based on specific needs and functionalities. We could clearly see the necessity of differentiating Data Manipulation and Analysis libraries like Pandas and NumPy vs Deep Learning frameworks such as TensorFlow and PyTorch. Our approach therefore categorized the libraries into 14 buckets that enhance efficiency, clarity and specialization in AI and ML development tasks, ensuring the right place of identification within the supply chain:<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t On to the forefront of supply chain security:\u00a0 our exploration navigates the landscape of potential risks posed by vulnerabilities within these critical frameworks. By uncovering vulnerabilities and their implications, we illuminate the path toward fortifying AI systems with robust defenses and proactive security measures.<\/span><\/p> We analyzed the Top 300 python AI\/ML Libraries, leveraging Securin\u2019s Vulnerability Intelligence to map 838 known CVEs for each unique package version.<\/span><\/p> With 426 CVEs, TensorFlow takes the first spot in our AI\/ML python libraries ranked by number of direct vulnerabilities. It\u2019s interesting to note the mix of top affected libraries with Deep Learning packages such as TensorFlow, Data Manipulation and Analysis libraries like NumPy as well as utilities like Django making up the Top 10.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t The threats associated with the vulnerabilities are concerning, with the number of weaponized CVEs (122) and the chatter around them in deep\/dark web forums (353) indicating a growing interest from cybercriminals in exploiting them.<\/span><\/p> One of these, CVE-2023-4863<\/a>: Heap buffer overflow in libwebp in Google Chrome which has been exploited in the wild, also impacts the pillow library.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t Let\u2019s go another layer deep, drilling down to the weaknesses that foster vulnerabilities within AI\/ML Libraries. Twelve of the MITRE Top 25 Weaknesses are present in the top 25 weaknesses across AI\/ML Library CVEs. Some standouts are:<\/span><\/p> These weaknesses are rare occurrences in the larger CVE dataset but become more prominent within AI\/ML frameworks.\u00a0 You won\u2019t see a Software Engineer leave behind a \u201cDivide by Zero\u201d bug! That\u2019s why Data Scientists and Engineers are so different! .<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\tA Closer Inspection of AI\/ML Libraries<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Apples & Oranges: Categorizing AI\/ML Libraries<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Navigating Critical Risks in the Supply Chain<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Operationalizing within the AI\/ML Supply Chain<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t