TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Help Net Security

Unpatched flaws turn Ollama’s auto-updater into a persistent RCE vector, researchers say

Zeljka Zorz · 1 day ago · Read original ↗

ATT&CK techniques detected

5 predictions
T1195.002Compromise Software Supply Chain
56%
“updates in the background. striga surfaced the [ vulnerability ] chain during an audit of the ollama repository, ” striga co - founder bartłomiej dmitruk explained. cve - 2026 - 42248 is straightforward : the windows build ’ s auto - updater signature verification function exists…”
T1105Ingress Tool Transfer
55%
“updates in the background. striga surfaced the [ vulnerability ] chain during an audit of the ollama repository, ” striga co - founder bartłomiej dmitruk explained. cve - 2026 - 42248 is straightforward : the windows build ’ s auto - updater signature verification function exists…”
T1574Hijack Execution Flow
35%
“updates in the background. striga surfaced the [ vulnerability ] chain during an audit of the ollama repository, ” striga co - founder bartłomiej dmitruk explained. cve - 2026 - 42248 is straightforward : the windows build ’ s auto - updater signature verification function exists…”
T1105Ingress Tool Transfer
34%
“survives indefinitely. on the next login, windows runs whatever was dropped there, and there is no warning ( since the dropped file does not carry a mark - of - the - web tag ). “ the same dropped binary fires on every subsequent login until the file is removed, ” he pointed out,…”
T1204.002Malicious File
31%
“updates in the background. striga surfaced the [ vulnerability ] chain during an audit of the ollama repository, ” striga co - founder bartłomiej dmitruk explained. cve - 2026 - 42248 is straightforward : the windows build ’ s auto - updater signature verification function exists…”

Summary

Researchers at Striga have disclosed two vulnerabilities (CVE-2026-42248, CVE-2026-42249) in Ollama’s Windows auto-updater that, when chained together, may allow an attacker to covertly plant a persistent executable that runs on every login. CVE-2026-42248 and CVE-2026-42249 Ollama is an open-source tool for running large language models locally. It’s is used by those who don’t want their data to leave their machine and don’t want to be constrained by API costs, usage limits, or the requirement of … More

The post Unpatched flaws turn Ollama’s auto-updater into a persistent RCE vector, researchers say appeared first on Help Net Security.