CVE-2025-63662
📋 TL;DR
This vulnerability allows unauthorized attackers to access sensitive information through insecure permissions in the GT Edge AI Platform's /api/v1/agents API. It affects all deployments running versions before v2.0.10-dev. Attackers can exploit this without authentication to retrieve confidential data.
💻 Affected Systems
- GT Edge AI Platform
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete exposure of all agent data including credentials, configuration secrets, and proprietary AI models stored in the platform.
Likely Case
Unauthorized access to agent metadata, configuration details, and potentially sensitive operational data.
If Mitigated
Limited information disclosure if proper network segmentation and API gateway controls are implemented.
🎯 Exploit Status
Simple HTTP GET requests to the vulnerable endpoint can retrieve sensitive data. Proof-of-concept code is available in the referenced GitHub repository.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v2.0.10-dev
Vendor Advisory: Not provided in references
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download v2.0.10-dev from official vendor source. 3. Stop the GT Edge AI Platform service. 4. Apply the update. 5. Restart the service. 6. Verify the fix by testing API access controls.
🔧 Temporary Workarounds
Network Access Control
linuxRestrict network access to the /api/v1/agents endpoint using firewall rules.
iptables -A INPUT -p tcp --dport [API_PORT] -s [TRUSTED_IPS] -j ACCEPT
iptables -A INPUT -p tcp --dport [API_PORT] -j DROP
API Gateway Authentication
allImplement authentication proxy in front of the vulnerable endpoint.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the GT Edge AI Platform from untrusted networks.
- Deploy a web application firewall (WAF) with rules to block unauthorized access to /api/v1/agents endpoint.
🔍 How to Verify
Check if Vulnerable:
Send HTTP GET request to https://[TARGET]/api/v1/agents without authentication. If it returns agent data, the system is vulnerable.
Check Version:
Check platform version in web interface or configuration files, or run: curl -k https://[TARGET]/api/version
Verify Fix Applied:
Attempt the same unauthenticated request after patching. It should return 401/403 error or no sensitive data.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated requests to /api/v1/agents endpoint
- High volume of GET requests to agents API from unusual sources
Network Indicators:
- Unusual data egress patterns from the platform
- External IPs accessing /api/v1/agents without prior authentication
SIEM Query:
source="gt-edge-ai" AND (uri_path="/api/v1/agents" AND http_method="GET" AND auth_status="failed")