Incremental increase in AI API vulnerabilities by 2024

Economists have widely predicted that China will fail to meet its growth target of 5.5 percent of GDP, blaming record youth unemployment, rising developer debt and manufacturing disruptions due to frequent Covid -lockdowns. – Copyright AFP Ahmad Al-rubaye

A new report shows that AI has a major Application Programming Interface (API) problem. This is evident from a Wallarm report (from the end-to-end API and app security company). The report reveals a significant increase in advanced cyber threats targeting AI infrastructure product APIs. As more AI products and tools rely on APIs, they become increasingly vulnerable to new and potentially critical API security risks.

DevOps and DevTools are another route for attackers. API vulnerabilities include commonly used DevOps tools, with DevOps tools and development frameworks contributing to the vulnerability.

Examples include mistakes in early AI development cycles that have created vulnerabilities for industry giants like Mercedes-Benz and tech innovators like NVIDIA’s Triton Inference Server, ZenML, and Hail.

Mercedes Benz

A major API breach resulted in unrestricted access to their source code and GitHub Enterprise, exposing cloud keys and internal documents. The scale of exposure to critical breaches and the destructive behavior of attackers makes this the biggest threat of 2024 so far.


ZenML is a platform used by thousands of top companies such as Airbus and Goodyear to standardize MLOps workflows. The company faced a critical API vulnerability, which gave attackers unauthorized access to ZenML accounts.

The ZenML Takeover via Account Activation REST API Vulnerability (CVE-2024-25723) ranks second due to the simplicity of the exploit and its potential to provide widespread, unauthorized access to MLOps workflows from thousands of enterprises.


A deceptively simple attack via the Account Takeover vulnerability (CVE-2023-7028) allowed hackers to intercept password reset codes via email, allowing them to take over an organization’s entire GitLab instance.


The NVIDIA AI Platform Path Traversal Exploit (CVE-2023-31036) had the potential for serious and far-reaching consequences for NVIDIA customers, including code execution, privilege escalation, and others. NVIDIA quickly took action, which apparently saved them from the top spot.


The Grafana exploit (CVE-2024-1442) gave users with data source creation permissions the ability to grant access to read, query, edit, and delete all data sources within the organization. This is still under investigation and could escalate.