CVE-2023-48022
Chainguard vulnerability analysis and mitigation

Overview

Anyscale Ray versions 2.6.3 and 2.8.0 contain a critical vulnerability (CVE-2023-48022) that allows remote attackers to execute arbitrary code via the job submission API. The vulnerability was discovered in August 2023 by Bishop Fox researchers and has been actively exploited since September 2023. Despite having a CVSS score of 9.8 (Critical), this vulnerability remains disputed as the vendor maintains that Ray is not intended for use outside of strictly controlled network environments (Bishop Fox, Help Net Security).

Technical details

The vulnerability stems from Ray's lack of authentication requirements in its Jobs API, which allows unauthorized actors to freely submit jobs, delete existing jobs, retrieve sensitive information, and achieve remote command execution. The most direct exploitation method involves submitting arbitrary operating system commands through the job submission API using either raw HTTP requests or the Ray Jobs Python SDK. This can be done without authentication in the default configuration, accessible to any system with access to the Ray Dashboard on TCP port 8265 (Bishop Fox).

Impact

The vulnerability has led to the compromise of thousands of publicly exposed Ray servers worldwide. Attackers have gained access to sensitive information including OpenAI tokens, Stripe tokens, HuggingFace tokens, Slack tokens, production database credentials, and SSH keys. Additionally, compromised machines have been used for cryptocurrency mining operations and establishing permanent access through reverse shells. AI production workloads were also compromised, potentially affecting model integrity and training processes (Help Net Security).

Mitigation and workarounds

Anyscale has decided not to ship an immediate fix, maintaining that Ray's interface should not be exposed on the internet and should only be accessible to trusted parties. They recommend deploying Ray clusters in isolated networks and controlling access using other mechanisms, such as SSH bastion hosts. If access to the Ray dashboard is required outside an isolated network, users should expose it via a reverse proxy service configured to require authentication (Bishop Fox, Ray Security Docs).

Community reactions

The security community has expressed concern about the disputed status of the vulnerability, particularly given its active exploitation. Oligo Security researchers have helped multiple companies mitigate unauthorized access to their clusters and have shared indicators of compromise. Anyscale has announced they are working on a script to help users verify their configuration and avoid accidental exposure (Help Net Security).

Additional resources


SourceThis report was generated using AI

Related Chainguard vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23884HIGH7.7
  • WolfiWolfi
  • freerdp-libs
NoYesJan 19, 2026
CVE-2026-23883HIGH7.7
  • WolfiWolfi
  • freerdp
NoYesJan 19, 2026
CVE-2026-23732MEDIUM5.5
  • WolfiWolfi
  • freerdp
NoYesJan 19, 2026
CVE-2026-23849MEDIUM5.3
  • WolfiWolfi
  • github.com/filebrowser/filebrowser/v2
NoYesJan 19, 2026
CVE-2025-15281N/AN/A
  • WolfiWolfi
  • glibc-langpack-anp
NoYesJan 20, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management