Détail du CWE-1434

CWE-1434

Insecure Setting of Generative AI/ML Model Inference Parameters
Draft
2025-09-09
00h00 +00:00
Notifications pour un CWE
Restez informé de toutes modifications pour un CWE spécifique.
Gestion des notifications

Nom: Insecure Setting of Generative AI/ML Model Inference Parameters

The product has a component that relies on a generative AI/ML model configured with inference parameters that produce an unacceptably high rate of erroneous or unexpected outputs.

Description du CWE

Generative AI/ML models, such as those used for text generation, image synthesis, and other creative tasks, rely on inference parameters that control model behavior, such as temperature, Top P, and Top K. These parameters affect the model's internal decision-making processes, learning rate, and probability distributions. Incorrect settings can lead to unusual behavior such as text "hallucinations," unrealistic images, or failure to converge during training. The impact of such misconfigurations can compromise the integrity of the application. If the results are used in security-critical operations or decisions, then this could violate the intended security policy, i.e., introduce a vulnerability.

Informations générales

Modes d'introduction

Build and Compilation : During model training, hyperparameters may be set without adequate validation or understanding of their impact.
Installation : During deployment, model parameters may be adjusted to optimize performance without comprehensive testing.
Patching and Maintenance : Updates or modifications may be made to the model that alter its behavior without thorough re-evaluation.

Plateformes applicables

Langue

Class: Not Language-Specific (Undetermined)

Architectures

Class: Not Architecture-Specific (Undetermined)

Technologies

Name: AI/ML (Undetermined)
Class: Not Technology-Specific (Undetermined)

Conséquences courantes

Portée Impact Probabilité
Integrity
Other
Varies by Context, Unexpected State

Note: The product can generate inaccurate, misleading, or nonsensical information.
OtherAlter Execution Logic, Unexpected State, Varies by Context

Note: If outputs are used in critical decision-making processes, errors could be propagated to other systems or components.

Mesures d’atténuation potentielles

Phases : Implementation // System Configuration // Operation
Develop and adhere to robust parameter tuning processes that include extensive testing and validation.
Phases : Implementation // System Configuration // Operation
Implement feedback mechanisms to continuously assess and adjust model performance.
Phases : Documentation
Provide comprehensive documentation and guidelines for parameter settings to ensure consistent and accurate model behavior.

Méthodes de détection

Automated Dynamic Analysis

Manipulate inference parameters and perform comparative evaluation to assess the impact of selected values. Build a suite of systems using targeted tools that detect problems such as prompt injection (CWE-1427) and other problems. Consider statistically measuring token distribution to see if it is consistent with expected results.
Efficacité : Moderate

Manual Dynamic Analysis

Manipulate inference parameters and perform comparative evaluation to assess the impact of selected values. Build a suite of systems using targeted tools that detect problems such as prompt injection (CWE-1427) and other problems. Consider statistically measuring token distribution to see if it is consistent with expected results.
Efficacité : Moderate

Notes de cartographie des vulnérabilités

Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Commentaire : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

NotesNotes

This weakness might be under-reported as of CWE 4.18, since there are no clear observed examples in CVE. However, inference parameters may be the root cause for various vulnerabilities - or important factors - but the vulnerability reports may concentrate more on the negative impact (e.g. code execution) or the weaknesses that the insecure settings contribute to. Alternately, dynamic techniques might not reveal the root cause if the researcher does not have access to the underlying source code and environment.

Références

REF-1487

We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs
Joseph Spracklen, Raveen Wijewickrama, A H M Nazmus Sakib, Anindya Maiti, Bimal Viswanath, Murtuza Jadliwala.
https://arxiv.org/abs/2406.10279

Soumission

Nom Organisation Date Date de publication Version
Lily Wong MITRE 2024-06-28 +00:00 2025-09-09 +00:00 4.18