www.computerweekly.com
alexandrink1966 - stock.adobe.coNewsDeepSeek API, chat log exposure a rookie cyber errorSecurity researchers at Wiz find a trove of DeepSeek data including API secrets and chat logs publicly exposed via an open source database management tool, raising questions about the fast-growing services approach to securityByAlex Scroxton,Security EditorPublished: 31 Jan 2025 16:56 Days after a significant cyber attack of unknown provenance caused significant disruption for users of emergent Chinese generative artificial intelligence (GenAI) model DeepSeek, persistent security issues continue to dog the fast-growing application, and reports are emerging of a fundamental lack of attention paid to basic cyber security measures at DeepSeek itself.This is according to researcher Gal Nagli of Wiz, a cloud security specialist, who on Wednesday 29 January published details of a publicly accessible DeepSeek database containing a trove of data, which he said enabled full control over database operations.Nagli said he was motivated to assess DeepSeeks external cyber security posture and identify possible vulnerabilities in light of the platforms meteoric rise to global prominence.Within minutes, we found a publicly accessible ClickHouse database linked to DeepSeek, completely open and unauthenticated, exposing sensitive data. It was hosted at oauth2callback.deepseek.com:9000 and dev.deepseek.com:9000, said Nagli.This database contained a significant volume of chat history, back-end data and sensitive information, including log streams, API secrets, and operational details.More critically, the exposure allowed for full database control and potential privilege escalation within the DeepSeek environment, without any authentication or defence mechanism to the outside world, he added.Nagli found the exposed database through a standard mapping exercise of DeepSeeks publicly accessible domains. He found about 30 internet-facing subdomains, most of which were benign, but on expanding his search beyond standard HTTP ports 80 and 443, he found two open ports, 8123 and 9000, associated with the vulnerable hosts.Leveraging ClickHouses HTTP interface, he was then able to access a specific path that enabled direct execution of arbitrary SQL queries in a web browser; running a show tables query returned the list of exposed datasets.This level of access posed a critical risk to DeepSeeks own security and for its end-users. Not only could an attacker retrieve sensitive logs and actual plain text chat messages, but they could also potentially exfiltrate plain text passwords and local files along with propriety information directly from the server depending on their ClickHouse configuration, said Nagli.Nagli informed DeepSeek of the exposed ClickHouse service through responsible disclosure channels, and Computer Weekly understands they have now been locked down.ClickHouse is an open source database management tool used for processing, log storage and analytics which was initially developed at Yandex in Russia, although it is now based in Silicon Valley.William Wright, CEO ofClosed Door Security, a consultancy based in Scotlands Western Isles, said the issues were highly concerning given DeepSeek was giving some of the worlds most well-established AI leaders a run for their money.Security must be a priority, but leaving a database like this exposed is a rookie mistake, he said. In the last week, DeepSeek has been thrust into the public eye, but the company is clearly now learning that not all publicity is good publicity.Having plain text conversations in a public-facing database could provide criminals with access to confidential information relating to businesses and individuals. Criminals could also exploit further commands to steal more information from users, which would put them at even greater risk.This is also one of the key reasons why organisations must run proactive assessments across their networks, so weaknesses can be identified and mitigated before they are exposed by researchers or threat actors, said Wright.Read more about DeepSeekDeepSeek, a Chinese AI firm, is disrupting the industry with its low-cost, open source large language models, challenging US tech giants.The introduction of DeepSeeks GenAI models has been met with fervour, but security issues have created apparent challenges for the Chinese startup.DeepSeek, which gained popularity recently for its AI platform, did not specify the cause of large-scale malicious attacks, which continue to disrupt new account registrations.In The Current Issue:World Economic Forum: Digital supply chains at risk as world faces two years of turbulenceData sovereignty and security in the UKDownload Current IssueConfluent: Shifting the paradigm to (real-time) data engineering CW Developer NetworkVision for the technology landscape of 2025 Data MattersView All Blogs