AVID-2026-R1291
Description
Vulnerability CVE-2023-48022
Details
Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor’s position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment. (Also, within that environment, customers at version 2.52.0 and later can choose to use token authentication.)
Reason for inclusion in AVID: CVE-2023-48022 describes a remote code execution vulnerability in Anyscale Ray (versions 2.6.3 and 2.8.0) via the job submission API. Ray is a core AI framework used in ML pipelines for building, deploying, and running AI systems, placing this squarely in software supply-chain relevance for general-purpose AI stacks. The vulnerability is a security risk (RCE) and is evidenced by the CVE/NVD entry and related security discussions/advisories. The report provides explicit vulnerability behavior and references, supporting classification.
References
- NVD entry
- https://bishopfox.com/blog/ray-versions-2-6-3-2-8-0
- https://docs.ray.io/en/latest/ray-security/index.html
- https://www.vicarius.io/vsociety/posts/shadowray-cve-2023-48022-exploit
- https://atlas.mitre.org/studies/AML.CS0023
- https://docs.ray.io/en/latest/ray-security/token-auth.html
Affected or Relevant Artifacts
- Developer: n/a
- Deployer: n/a
- Artifact Details:
| Type | Name |
|---|---|
| System | n/a |
Impact
AVID Taxonomy Categorization
- Risk domains: Security
- SEP subcategories: S0100: Software Vulnerability
- Lifecycle stages: L06: Deployment
Other information
- Report Type: Advisory
- Credits:
- Date Reported: 2023-11-28
- Version: 0.3.3
- AVID Entry