CVE-2025-63664
GT · GT Edge AI Platform
A high-severity vulnerability exists in the GT Edge AI Platform that could allow an authenticated attacker to gain unauthorized access to sensitive conversation data.
Executive summary
A high-severity vulnerability exists in the GT Edge AI Platform that could allow an authenticated attacker to gain unauthorized access to sensitive conversation data. This flaw, caused by improper access control in a core API, could lead to a significant data breach, exposing private communications and confidential information. Organizations are urged to apply the vendor-provided security update immediately to mitigate this risk.
Vulnerability
The vulnerability is an incorrect access control flaw within the /api/v1/conversations/*/messages API endpoint. The application fails to properly verify if the authenticated user making the request is authorized to access the specified conversation. A low-privileged, authenticated attacker can exploit this by manipulating the conversation ID in the API request to access and retrieve messages from any conversation on the platform, including those belonging to other users or organizations.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could lead to a significant confidentiality breach, allowing unauthorized access to potentially sensitive information exchanged within the platform's messaging system. The business risks include exposure of customer data, intellectual property, or confidential internal communications, which could result in reputational damage, loss of customer trust, and potential regulatory penalties for non-compliance with data protection standards.
Remediation
Immediate Action: Apply the vendor-provided security update for the GT Edge AI Platform to upgrade to version 2 or later. This patch corrects the access control logic to ensure users can only access messages from conversations they are a part of.
Proactive Monitoring: Security teams should actively monitor web server and application logs for anomalous activity related to the /api/v1/conversations/*/messages endpoint. Specifically, look for a single user session or IP address making numerous requests with different conversation IDs in a short time frame, which could indicate scanning or active exploitation attempts. Review historical logs for signs of prior compromise.
Compensating Controls: If immediate patching is not feasible, consider implementing a Web Application Firewall (WAF) rule to rate-limit or block requests from a single user attempting to access a high number of unique conversation IDs. Additionally, enhance logging and alerting specifically for this API endpoint to ensure any suspicious access patterns are immediately investigated.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score and the direct risk of a sensitive data breach, this vulnerability should be treated as a high priority for remediation. We strongly recommend that all organizations using affected versions of the GT Edge AI Platform apply the vendor security updates immediately. While there is no evidence of current exploitation, the simplicity of a potential attack warrants urgent action to prevent future compromise.