Security
Headlines
HeadlinesLatestCVEs

Headline

4 Main API Security Risks Organizations Need to Address

Misconfigurations, weak authentication, and logic flaws are among the main drivers of API security risks at many organizations.

DARKReading
#sql#vulnerability#web#dos#git#perl#buffer_overflow#acer#oauth#auth

Source: Who is Danny via Shutterstock

Security vulnerabilities in the application programming interfaces (APIs) powering modern digital services and applications have emerged as a major threat to enterprise systems and data.

A recent report from Wallarm shows a 21% increase in API-related flaws between this year’s second and third quarters. Nearly one-third (32%) were associated with cloud infrastructure and cloud-native applications and services. In addition to the increased volume, a high proportion of the vulnerabilities that Wallarm reviewed had severity scores of 7.5 or higher, indicating growing risk for organizations from API use.

“In Q3 we saw API breaches driven by authentication and authorization issues, leaked API data, and classic injection attacks,” says Wallarm founder and CEO Ivan Novikov.

Significantly, while many of the vulnerabilities in OWASP’s list of Top 10 API vulnerabilities are server-focused, Wallarm’s data shows an uptick in client-side flaws, like OAuth misconfiguration and cross-site issues, Novikov says.

“It’s concerning because defenders are resource-constrained and need to focus on the most important types of attacks,” he says.

A continuing enterprise emphasis on API integration and functionality — over security — is exacerbating the issue. Just 37% of organizations have formally incorporated security testing into their API life cycle management practices, a study by Postman found earlier this year.

“APIs are now a top target for malicious actors, making security and observability critical,” the report noted.

What are the major contributors to API security risks? And what should organizations be doing to mitigate them?

Misconfigured APIs

Many API security issues in recent years have stemmed from relatively easily avoidable misconfigurations. Common examples include inadequate authentication and authorization, lack of input validation, improper rate limiting, inadequate logging and monitoring, and the exposure of sensitive data through error messages. Such misconfigurations can have severe consequences.

For instance, Broken Object Level Authorization — when an API does not properly validate user access to resources — can allow attackers to manipulate object IDs to access unauthorized data, says Ankit Sobti, co-founder and CTO of Postman. Similarly, Broken User Authentication vulnerabilities — when an API fails to enforce proper authentication — often allow attackers to bypass authentication checks and gain unauthorized access to endpoints.

Organizations can mitigate these issues by implementing security best practices, such as strict authorization checks, role-based access control, multifactor authentication, server-side data filtering, and reviewing API responses for unnecessary data.

“Without proper rate limiting, APIs become vulnerable to abuse through techniques like brute-force attacks or denial-of-service attacks, which can overwhelm the service,” Sobti stresses.

The vast majority of API-related breaches over the past few years have resulted from poor posture governance, says Nick Rago, field CTO at Salt Security. In many instances, “the barrier to breach was pretty low, and the attacker did not need any herculean effort to take advantage of a misconfigured API.”

Rago attributes the problem to a lack of proper oversight over API development and management.

Building a governance framework around the creation of a corporate posture standard is an important first step, he says. To alleviate risks, organizations need to implement capabilities for discovering API assets, assessing their security posture, and remediating noncompliance as needed, Rago adds.

Badly Designed APIs

Poorly designed APIs are another major driver of API security incidents; these APIs do everything they are supposed to do, except in a manner that an adversary can take advantage of, Rago says.

“Think of APIs that return more information than an application needs or APIs that can be scraped for information over time,” he explains.

Other examples include APIs that use unvalidated SQL inputs, expose implementation details, are too complex and bloated, handle errors in an insecure manner, or have inconsistent naming and structure.

In addition, a poorly designed API can sometimes ignore business logic inconsistencies, Rago says. Examples include ecommerce APIs that allow users to manipulate prices or make modifications that enable overly permissive access to accounts and transactions. Imperva’s “State of API Security 2024” report, in fact, identified business logic abuse as last year’s top attack on APIs. These attacks accounted for 27% of all API related attacks in 2023, an increase of some 10% over the prior year.

“Both abuse of badly designed APIs or attacks leveraged against a business logic vulnerability can be addressed by leveraging specialized behavioral threat protection that can decipher not just anomalous usage but discern malicious intent behind an API consumer,” Rago notes.

As Imperva vice president of API security Lebin Cheng wrote in an op-ed earlier this year, poorly made API design decisions can have a lasting impact on organizations and their customers. APIs, for instance, could cause serious performance bottlenecks if developers fail to consider scalability requirements when designing them. Similarly, by focusing mostly on business needs, developers can often overlook common security issues, such as buffer overflow errors, during design time, Cheng wrote.

“The issue of poor API design is further compounded by the fact that there are no strict standards for how APIs should be designed,” he said. “This leaves it up to individual developers to determine the best way to implement and develop APIs, which means that poor design decisions can easily slip through the cracks.”

Lack of Visibility

APIs have emerged as a top attack vector for threat actors because of their near ubiquitous use. Imperva’s research showed organizations, on average, have 613 API endpoints per account. The security vendor found API traffic to account for 71% of all Web traffic in 2023, with the average enterprise making 1.5 billion API calls per year.

Despite the proliferating use and corresponding risk exposure, many organizations don’t have enough visibility over their APIs.

“New methods are required to discover and test APIs,” says Kimm Yeo, solutions manager at Black Duck.

Organizations need to start thinking about API security in a more proactive manner, Yeo advocates. That means implementing capabilities to discover and inspect APIs earlier in the software development life cycle, she says. The goal should be to ensure APIs and applications are continuously tested before they get into production.

“Today’s API security solutions largely focus on implementing API discovery during production, [where] any critical alerts produced are difficult to trace to the code,” she says. This can make it impossible for developers to fix identified issues, Yeo adds.

The pressing issue for most organizations is their lack of inventory of all externally facing APIs, says Krishna Vishnubhotla, vice president of product strategy at Zimperium.

“It’s critical to act quickly as bad actors are exploiting this gap,” he says. "The first step is to urgently discover and inventory all these public APIs, followed by immediate measures to secure them.

Inadequate Security Testing

Many organizations are failing to prioritize API security adequately and often underestimate the unique risks APIs pose. Postman’s survey found just 37% of organizations currently do automated scanning and regular penetration tests to try and catch API vulnerabilities earlier in the development life cycle. Relatively few have integrated security testing and checks in their API development process or centralized API monitoring capabilities.

Organizations that embrace API-first strategies — where APIs are a priority focus during the software planning, design, architecture, and development process — are seeing better success on the API security front, says Salt Security’s Rago.

“Those organizations typically enforce ‘spec-first development,’ meaning an API must be ‘blueprinted’ with Swagger or OAS and approved before a line of code is written,” he says. “You need to blueprint the hospital first and validate its construction against the plan before you let patients in. Seems obvious, but in most organizations that is still not the way it works.”

API risks fall under two big categories: access and availability, Wallarm’s Novikov says. Attackers either gain access to something they shouldn’t or they can take an API offline by impacting its availability.

“There are lots of technical details about how they might accomplish these objectives, but they all bubble up to these two outcomes,” Novikov says.

At a high level, the key protections against these risks are strong authentication and authorization across all API endpoints, he says.

“That means knowing all the APIs you have, which should require authentication, strictly checking authorization on the server side, and implementing advanced rate limiting to slow attackers down,” he advises. “These mitigations are best practices, but that doesn’t mean they’re common practices.”

About the Author

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master’s degree in Statistics and lives in Naperville, Ill.

DARKReading: Latest News

Varonis Warns of Bug Discovered in PostgreSQL PL/Perl