Report: DeepSeek’s Chat Histories and Internal Data Exposed Publicly

A recent discovery by a cloud security firm has unveiled a significant vulnerability involving DeepSeek, a prominent Chinese company making waves in the artificial intelligence sector. Within just minutes of investigating DeepSeek’s security framework, the firm, Wiz, identified a publicly accessible and fully controllable database left unsecured.

The compromised database is associated with DeepSeek’s analytical ClickHouse system and was described as “completely open and unauthenticated” by Wiz. It contained over one million entries, with sensitive information including chat histories, backend data, log streams, API secrets, and various operational details. Furthermore, the presence of an open web interface provided unrestricted access, enabling users to fully manipulate the database and escalate privileges through simple URL parameters.

According to Wiz’s blog, the incident highlights a critical oversight in the fast-evolving field of AI security. Gal Nagli emphasized that the most immediate dangers often arise from fundamental security lapses, such as the inadvertent exposure of databases to external access. He noted that as companies increasingly adopt AI tools from a diverse range of providers, they inadvertently entrust sensitive data to these entities. The pace of technological adoption can lead to the neglect of vital security measures, underscoring the necessity for organizations to prioritize data protection.

Wiz reached out to DeepSeek for comments on the findings but did not receive a response. However, following the comprehensive outreach to various email addresses and LinkedIn profiles associated with DeepSeek, the company secured the previously accessible databases within half an hour of the notification.

This incident raises significant concerns regarding database security and management practices, particularly in the context of the rapid deployment of new technologies. Business owners must remain vigilant about potential vulnerabilities that could expose sensitive information. Leveraging the MITRE ATT&CK framework reveals that tactics such as initial access through unsecured databases, as well as privilege escalation, were likely employed in this incident. This serves as a critical reminder that comprehensive security measures and regular audits are essential in safeguarding sensitive data in today’s digital landscape.

Source