CVE-2025-63663

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthorized attackers to access other users' uploaded files through the /api/v1/conversations/*/files API in GT Edge AI Platform. It affects all users of GT Edge AI Platform versions before v2.0.10 due to improper access control mechanisms.

💻 Affected Systems

Products:
  • GT Edge AI Platform
Versions: All versions before v2.0.10
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with the vulnerable API endpoint enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user-uploaded files including sensitive documents, credentials, and proprietary data leading to data breaches and regulatory violations.

🟠

Likely Case

Unauthorized access to confidential files belonging to other users, potentially exposing personal information, business documents, or intellectual property.

🟢

If Mitigated

Limited exposure if proper network segmentation and authentication controls are in place, but still vulnerable to authenticated attackers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires API access but no specific user permissions. Public proof-of-concept available in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.0.10

Vendor Advisory: https://gist.github.com/p80n-sec/f3ca933480157cb4e18c387d92f4d0c2

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download v2.0.10 from official vendor source. 3. Stop the GT Edge AI Platform service. 4. Apply the update following vendor documentation. 5. Restart the service and verify functionality.

🔧 Temporary Workarounds

API Endpoint Restriction

all

Temporarily block or restrict access to the vulnerable /api/v1/conversations/*/files endpoint

# Using iptables (Linux)
iptables -A INPUT -p tcp --dport <api_port> -m string --string "/api/v1/conversations/" --algo bm -j DROP
# Using Windows Firewall
New-NetFirewallRule -DisplayName "Block GT Edge AI Vulnerable API" -Direction Inbound -Protocol TCP -LocalPort <api_port> -RemoteAddress Any -Action Block

Authentication Enforcement

linux

Implement additional authentication layer or API gateway with strict access controls

# Example nginx configuration
location /api/v1/conversations/ {
    auth_request /auth;
    proxy_pass http://backend;
}

🧯 If You Can't Patch

  • Implement network segmentation to isolate the GT Edge AI Platform from untrusted networks
  • Deploy a web application firewall (WAF) with rules to detect and block unauthorized file access patterns

🔍 How to Verify

Check if Vulnerable:

Test if unauthorized API requests to /api/v1/conversations/*/files return other users' file data. Check current version against vulnerable range.

Check Version:

Check platform version in admin interface or run: curl -X GET http://<host>:<port>/api/v1/version

Verify Fix Applied:

After patching, verify that unauthorized requests to the API endpoint return proper access denied errors and only authenticated users can access their own files.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful file access
  • Unusual patterns of file access from single IP across multiple user sessions
  • API requests to /api/v1/conversations/*/files with mismatched user IDs

Network Indicators:

  • Unusual volume of requests to file API endpoints
  • Requests accessing file paths with sequential or random conversation IDs
  • Traffic patterns showing horizontal movement across user accounts

SIEM Query:

source="gt_edge_ai.log" AND (uri_path="/api/v1/conversations/*/files" AND user_id!=requesting_user_id)

🔗 References

📤 Share & Export