The Top Nine API Security Vulnerabilities

As APIs and microservices-based architectures have proliferated, the internet has quietly evolved into a global vehicle for API data exchange. Some estimates indicate that more than 70% of all internet traffic is now driven by APIs. Consequently, this data exchange has become a tempting target for cyberattacks. It’s anticipated that API attacks will increase at a rate of 31% annually for the foreseeable future, costing hundreds of billions of pounds by the end of the decade.

Attacks on APIs can be particularly devastating, potentially compromising proprietary and private data, disrupting service operations, and eroding trust in brands and governments alike.

In this article, we explore nine of the most common API vulnerabilities seen today, how they’re being targeted by cybercriminals, and how they can be addressed.

1.    Excessive Data Exposure

Threat: Excessive data exposure happens when APIs unnecessarily expose sensitive data to clients, such as personal identifiers. An API will respond to a request with additional data that’s expected to be filtered or ignored by the user. This can occur through overly broad data retrieval operations.

Mitigation: Developers must implement strict output filtering to allow sharing only necessary data when an API responds to a request. Employing least-privilege or zero trust principles in data access can significantly reduce the risk of such exposures.

2.    Broken User Authentication

Threat: Attackers assume other users’ identities, either by stealing login credentials or taking over user sessions. Broken user authentication strategies used to gain access include credential stuffing, where a known list of usernames and passwords is used to force a way in, unverified API endpoints that lack verification with CAPTCHA, or strategic password guesses to exploit any weak passwords.

Mitigation: Adopt multi-factor authentication and conduct regular security audits to identify weak password policies, outdated authentication protocols or flawed token management. Regular updates will help to close any gaps in user authentication.

3.    Broken Object-Level Authorisation

Threat: Broken object-level authorisation (BOLA) occurs when attackers access other users’ data by sending requests for data objects that should be protected with authorisation controls. This can happen when access is granted without checking permissions or validating user identities.

Mitigation: Data access permissions need to be rigorously enforced across all API interactions to prevent unauthorised data access. Implementing strict access controls, such as role-based access control (RBAC) and attribute-based access control (ABAC), helps ensure that only authorised users can access specific data objects.

An API gateway can help enforce these permissions by acting as a central point for managing and validating these access controls. Additionally, continuous monitoring and auditing of access logs can help detect and respond to unauthorised access attempts, further enhancing security.

4.    Mismanagement in the API Ecosystem

Threat: Improper API asset management can expose businesses to significant security risks. Poorly catalogued or unmonitored APIs create vulnerabilities that attackers can exploit to access sensitive information or disrupt operations.

Mitigation: Regular reviews and updates to the API inventory to verify that all endpoints are known and secure are essential. This will help keep active APIs up to date, while deprecated APIs can be properly decommissioned.

5.    Improperly Configured Rate Limits

Threat: Rate limiting is crucial for maintaining API performance and preventing abuse. Without effective rate limits, APIs can be overwhelmed by too many requests, leading to denial of service and making the system vulnerable to attacks. In some cases, attackers may intentionally consume an API’s resources to reduce its availability.

Mitigation: Implementing rate limiting not only helps traffic performance and management, it also protects APIs from automated attacks that can cause service degradation. Proper configuration of rate limits according to the application’s capacity and normal usage patterns is essential for maintaining service availability.

6.    Broken Function-Level Authorisation

Threat: Broken function-level authorisation refers to scenarios where APIs don’t properly verify user permissions for specific operations, allowing unauthorised execution of functions. They can be targeted by intercepting application traffic, manipulating outward-facing code or pinpointing exposed endpoints.

Mitigation: API security strategies must include robust authorisation checks that validate user permissions at every function call, thereby ensuring users can execute only the functions appropriate to their permission levels.

7.    Code-Injection Attacks

Threat: Injection attacks occur when malicious inputs are sent to an interpreter as part of a command or query. APIs vulnerable to such attacks can execute unintended commands or access unauthorised data, significantly compromising system security.

Mitigation: To mitigate these risks, APIs should employ strict input validation and use prepared statements or parameterised queries in databases. Educating developers on secure coding practices is also vital to building resilience against injection vulnerabilities.

8.    DDoS Attacks

Threat: Distributed denial of service (DDoS) attacks flood APIs with high volumes of requests to disrupt service. These attacks overwhelm an API’s resources, making it unable to respond to legitimate requests, which can lead to significant downtime and service interruptions. The implications of a successful DDoS attack can be severe, including loss of revenue, damaged reputation and potential breaches, especially if it’s combined with other attack vectors.

Mitigation: Effective mitigation involves sophisticated monitoring and response strategies to detect and neutralise these threats promptly. Employing rate limiting, geo-blocking and challenge-response tests such as CAPTCHAs can help reduce the impact. Additionally, using cloud-based DDoS protection services can provide scalability to absorb and mitigate large-scale attacks, helping API services remain operational during an attack.

9.    Outdated Security Models

Threat: Traditional security models often rely on a perimeter-based approach, which assumes that everything inside the network is trustworthy. However, this approach is vulnerable to insider threats and sophisticated external attacks that can breach the perimeter.

Mitigation: Zero trust security eliminates the concept of implicit trust within the network by continuously verifying every request, regardless of origin. By implementing zero trust principles, organisations can help ensure that only authenticated and authorised users and devices can access specific resources. This involves using technologies like mutual TLS (mTLS) for encryption and identity verification, micro-segmentation to isolate network segments, and continuous monitoring to detect and respond to threats in real-time.

Ultimately, most API security risks are the result of poor API design, implementation or configuration, or upholding outdated security measures. However, these are all within our control. API gateways create a central entry point for all user API requests, making them the best way to ensure reliable API management.

Marco Palladino is CTO and co-founder of Kong   

Image: geralt

You Might Also Read: 

Five Critical Security Measures To Enforce API Security:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 


« Self-Regulation In The Email Provider Market
Warnings Over Cyber Security At The Paris Olympics »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

European Business Reliance Centre (EBRC)

European Business Reliance Centre (EBRC)

EBRC is a leader in integrated Data Center, Cloud and Managed Services and a Centre of Excellence in Europe in the Management of Sensitive Information.

BEAM Teknoloji

BEAM Teknoloji

BEAM Technology is an independent Software Quality and Security Testing Center in Turkey.

Innova

Innova

Innova is Turkey's leading IT solutions company, providing platform independent solutions to organizations in telecommunication, finance, production, public and service sectors.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

Cryptoloc

Cryptoloc

Cryptoloc's core business is developing solutions designed to protect businesses from all kinds of security threats using a unique patented cryptography.

Grayshift

Grayshift

Grayshift is the leading provider of mobile device digital forensics, specializing in lawful access and extraction.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

eCapital

eCapital

eCAPITAL is a leading venture capital firm that provides early to growth stage funding to technology companies in fields including software & information technology, cybersecurity and industry 4.0.

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Intraframe US

Intraframe US

Intraframe US is a cybersecurity company in Memphis, specializing in Digital Forensics Incident Response and Managed IT services. We provide SMBs with a 24/7 SOC for proactive Cyber Threat Management.