Researchers Uncover Exposed DeepSeek Database Leaking Sensitive Data!
Researchers from leading cloud security company Wiz have published it's findings following the discovery of a publicly accessible database belonging to DeepSeek. The critical database allowed full control over operations, including access to internal data. This exposure included over a million lines of log streams containing highly sensitive information. Wiz disclosed it's findings to DeepSeek, who promptly secured the database.
DeepSeek, a Chinese AI startup, has gained significant media attention for its cutting-edge AI models, particularly the DeepSeek-R1 reasoning model. This model competes with leading AI systems such as OpenAI’s o1 in terms of performance while also being cost-effective and efficient.
As DeepSeek’s prominence in AI grew, the Wiz Research team assessed its external security posture to identify potential vulnerabilities. Within minutes, we discovered a publicly accessible ClickHouse database, completely open and unauthenticated, exposing sensitive data. It was hosted at:
This database contained vast amounts of chat history, backend data, and sensitive information, including log streams, API secrets, and operational details. More critically, the exposure allowed full database control and potential privilege escalation within the DeepSeek environment without any authentication or defense mechanism.
Wiz Investigation
The Wiz investigation began with an assessment of DeepSeek’s publicly accessible domains. By mapping the external attack surface using passive and active discovery techniques, Wiz identified approximately 30 internet-facing subdomains. Most of these hosted benign elements such as chatbot interfaces, status pages, and API documentation.
However, further examination beyond standard HTTP ports (80/443) revealed two unusual, open ports (8123 & 9000) on the following hosts:
These ports led to a publicly exposed ClickHouse database, accessible without any authentication—an immediate red flag.
Understanding ClickHouse and Its Implications
ClickHouse is an open-source, columnar database management system designed for high-speed analytical queries on large datasets. Developed by Yandex, it is widely used for real-time data processing, log storage, and big data analytics. Given its capabilities, an exposed ClickHouse database presents a serious security risk.
Using ClickHouse’s HTTP interface, Wiz accessed the /play path, which allowed direct execution of arbitrary SQL queries via a web browser. A simple SHOW TABLES; query returned a full list of accessible datasets.
领英推荐
Sensitive Data Exposure
One table, log_stream, contained over one million log entries, including:
This level of access posed a critical risk to DeepSeek’s security and its end-users. Not only could an attacker retrieve sensitive logs and plaintext chat messages, but they could also potentially exfiltrate plaintext passwords and proprietary information directly from the server.
Wiz Key Takeaways
The rapid adoption of AI services without corresponding security measures introduces significant risks. This exposure highlights that immediate security threats to AI applications stem from the underlying infrastructure rather than futuristic AI-driven attacks.
Key lessons from this incident include:
Conclusion
AI adoption is occurring at an unprecedented pace, with many AI companies evolving into critical infrastructure providers without adequate security frameworks. As AI becomes deeply integrated into businesses worldwide, the industry must recognize the risks of handling sensitive data and enforce security practices equivalent to those required for public cloud providers and major infrastructure providers.
Read the complete Wiz report here
Big Data Enthusiast | Business Intelligence Analyst | Expert in Data Modeling, Analytics, and Automation | SQL, SAS & Power BI Specialist
2 周Stop feeding (any) AI with personal/sensitive data PERIOD. Big secret: You can run ollama/llama.cpp locally.... ?????? Enjoy! ?? PS: META ANGELS / while the rest are DEVILS!
Computer Scientist, Software Engineer, IT Generalist
3 周Never give it sensitive data Run a model locally (ollama/llama.cpp) Profit?
Former Cloud Security Engineer @ Penthara | IT Security Intern@Baksethunt | CyberSecurity Intern @ Gurgram Police |AZ-104 | AZ-900 | MS-900
4 周Please read my latest post.
OK Bo?tjan Dolin?ek
SAP FI/P2P/OpenText - VIM-OCR(BCC & IES)/Cybersecurity Consultant
1 个月CIA Triad is not rocket science.