VulnerabilitiesHIGH

AI Router Vulnerabilities - Attackers Inject Malicious Code

Featured image for AI Router Vulnerabilities - Attackers Inject Malicious Code
#AI agents#API routers#malicious code#UC Santa Barbara#LLM supply chain

Original Reporting

CSCyber Security News·Guru Baran

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🛡️
🛡️ VULNERABILITY DETAILS
CVE ID
CVSS Score
Severity RatingHigh
Affected ProductThird-party API routers
VendorVarious
Vulnerability TypeCode Injection
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Actively ExploitedYes
Patch AvailableNo
Workaround AvailableYes
🎯

Basically, some AI routers can be hacked to steal sensitive data and money.

Quick Summary

A new study reveals vulnerabilities in AI routers that allow attackers to inject malicious code and steal sensitive data. This poses serious risks as AI agents handle critical tasks. Developers must implement stronger defenses against these threats.

What Happened

A recent study by researchers from the University of California, Santa Barbara, has uncovered serious vulnerabilities in third-party API routers used in AI systems. These routers, which act as intermediaries between AI agents and model providers like OpenAI and Google, can be exploited to inject malicious code, hijack tool calls, and drain cryptocurrency wallets.

The Flaw

These routers operate as application-layer proxies, which means they have full access to the data being transmitted. Unlike traditional attacks that require complex methods to intercept data, these routers are often configured by developers themselves, making them a weak point in security. The study revealed alarming findings: 9 routers injected malicious code, while others intercepted sensitive credentials and even drained cryptocurrency.

What's at Risk

As AI agents increasingly manage high-stakes tasks, the implications of these vulnerabilities are severe. Attackers can manipulate commands sent to AI systems, leading to unauthorized actions and significant financial losses. The risk extends to any organization using AI tools that rely on these routers, making it a widespread issue.

Attack Chain

The attack works when the router terminates the secure connection from the client and starts a new one with the upstream provider. This allows the attacker to read and alter commands without detection. For instance, a rewritten command can lead to arbitrary code execution on the client machine, putting sensitive data at risk.

Mitigation Strategies

To combat these vulnerabilities, the researchers suggest three immediate mitigations:

  • Fail-closed policy gate: This blocks suspicious commands based on a local allowlist, but may still be bypassed.
  • Response-side anomaly screening: This method flags unusual payloads using machine learning, catching a significant percentage of injection attempts.
  • Append-only transparency logging: This records all request and response data, aiding forensic investigations after incidents.

Conclusion

The study emphasizes the need for stronger security measures in the AI ecosystem. Until major providers implement cryptographic integrity checks, developers must treat every intermediary as a potential threat and adopt layered defenses. The vulnerabilities in AI routers represent a critical attack surface that requires immediate attention to safeguard sensitive operations.

🔍 How to Check If You're Affected

  1. 1.Review API router configurations for unauthorized changes.
  2. 2.Monitor network traffic for unusual payload patterns.
  3. 3.Implement logging to track all API requests and responses.

🏢 Impacted Sectors

TechnologyFinance

Pro Insight

🔒 Pro insight: The findings highlight a critical gap in AI security, necessitating immediate action from developers to mitigate risks associated with third-party routers.

Sources

Original Report

CSCyber Security News· Guru Baran
Read Original

Related Pings

HIGHVulnerabilities

Chrome 147 Patches 60 Vulnerabilities, Two Critical Flaws

Google's Chrome 147 update fixes 60 vulnerabilities, including two critical flaws in WebML. Users must update their browsers to avoid potential exploits. Stay safe online!

SecurityWeek·
HIGHVulnerabilities

Orthanc DICOM Vulnerabilities - Crashes and RCE Risks

Nine vulnerabilities in the Orthanc DICOM server could allow hackers to crash systems or execute harmful code. Users must update to the latest version to stay secure.

SecurityWeek·
HIGHVulnerabilities

Critical Marimo Flaw Exploited Hours After Public Disclosure

A critical Marimo vulnerability was exploited within hours of disclosure, allowing unauthorized access and credential theft. Immediate action is required to mitigate risks.

SecurityWeek·
CRITICALVulnerabilities

AWS Patches Critical RCE and Privilege Escalation Flaws

AWS has released critical patches for vulnerabilities in its Research and Engineering Studio. These flaws could let attackers execute commands as root. Immediate updates are essential to safeguard sensitive data.

Cyber Security News·
HIGHVulnerabilities

Qualcomm Security Advisory - April 2026 Vulnerabilities

Qualcomm has issued a security bulletin for April 2026, highlighting vulnerabilities in its products. Users are urged to apply updates to protect their devices. Failing to do so may expose systems to significant risks.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

RomM 4.4.0 - Critical XSS/CSRF Vulnerability Discovered

A critical vulnerability in RomM 4.4.0 allows attackers to take over admin accounts via XSS and CSRF. Users must update to version 4.4.1 to avoid risks. Stay safe!

Exploit-DB·