CVE-2025-63662
Insecure · Insecure Multiple Products
A high-severity vulnerability has been identified in Insecure's GT Edge AI Platform, which could allow an attacker to gain unauthorized control over AI agents.
Executive summary
A high-severity vulnerability has been identified in Insecure's GT Edge AI Platform, which could allow an attacker to gain unauthorized control over AI agents. The flaw stems from improper permission checks in a core API endpoint, potentially leading to data exposure, service disruption, or malicious actions performed by the compromised agents. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this risk.
Vulnerability
The vulnerability exists due to insecure permissions in the /api/v1/agents API endpoint. The endpoint fails to properly validate the authentication and authorization of the user making the request. A remote, unauthenticated or low-privileged attacker can exploit this by sending crafted HTTP requests (e.g., GET, POST, PUT, DELETE) to this endpoint to list, create, modify, or delete AI agents without proper authorization, granting them administrative-level control over these components.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could have a significant business impact, including the compromise of sensitive data processed by the AI agents, disruption of critical business operations that rely on the platform, and potential reputational damage. An attacker could manipulate or delete agents, leading to operational failure, or exfiltrate proprietary information, resulting in a data breach. The risk is heightened in environments where these AI agents are integrated into core production or security systems.
Remediation
Immediate Action: Apply vendor security updates immediately to all affected instances of the GT Edge AI Platform to patch the insecure permissions vulnerability. Following the update, review access logs for any signs of unauthorized access or manipulation of the /api/v1/agents endpoint prior to the patch.
Proactive Monitoring: Security teams should actively monitor web server and application logs for unusual or anomalous requests to the /api/v1/agents API endpoint. Specifically, look for a high volume of requests from unknown IP addresses, or requests that result in successful actions (e.g., HTTP 200 OK) but lack expected authentication tokens.
Compensating Controls: If patching cannot be performed immediately, implement a Web Application Firewall (WAF) rule to restrict access to the /api/v1/agents endpoint, allowing connections only from trusted internal IP addresses. Additionally, consider network segmentation to isolate the GT Edge AI Platform from less trusted network zones, reducing its attack surface.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the High severity (CVSS 7.5) of this vulnerability and its potential for significant operational disruption and data compromise, it is strongly recommended that organizations prioritize the immediate application of the vendor-supplied security patch. Although this vulnerability is not currently listed on the CISA KEV list, its impact warrants urgent attention. If patching is delayed, the compensating controls outlined above should be implemented as a temporary measure to reduce the risk of exploitation.