🚀 CloudSEK has raised $19M Series B1 Round – Powering the Future of Predictive Cybersecurity
Read more
In today's interconnected world, APIs serve as the backbone of digital ecosystems, enabling seamless communication between services. However, the increasing reliance on APIs comes with its share of risks, especially when they are not properly secured. A recent investigation by CloudSEK’s BeVigil platform revealed critical vulnerabilities within a prominent diagnostic chain’s API infrastructure, exposing highly sensitive personal and medical data.
This blog unpacks the findings from BeVigil’s research, explores the potential consequences of such breaches, and offers actionable recommendations to mitigate risks and enhance API security.
CloudSEK’s BeVigil platform uncovered several vulnerabilities arising from a JavaScript file publicly accessible on the clients web assets. This file contained sensitive API keys, authentication tokens, and unsecured endpoints, granting unauthorized access to critical systems.
BeVigil’s Web App Scanner identified several key findings, including:
Compromised APIs: Flaws in both Admin and Live APIs left the client vulnerable to exploitation, risking the integrity of sensitive user data.
The vulnerabilities discovered in the clients API infrastructure go beyond technical flaws; they pose serious risks with far-reaching implications and large-scale misuse of healthcare data.
1. Initial Access Vector: During the review of a JavaScript file, a section of data was found containing web addresses and security keys linked to the Admin API. This revealed critical security issues, including exposed keys and access tokens. One of the web addresses posed a significant risk as it allowed unauthorized access to sensitive patient details using only their lab number, highlighting a major gap in data protection practices.
2. Exposed Medical Reports: Medical reports were accessible through the Live API by utilizing a combination of the patient’s lab number and last name. The lab number and last name, which could be extracted from the response of the previously exposed Admin API. This vulnerability allowed unauthorized access to detailed personal health information.
The PDF reports contained critical personal information such as the patient’s full name, contact number, medical condition with a detailed report, and invoice-related details. What made this issue even more alarming was the use of sequential lab numbers. This meant that with minimal effort, unauthorized individuals could access the medical reports and personal data of potentially millions of users.
3. Access to Email Services: Furthermore, an issue was identified within the email feature that allowed messages to be sent to any email address, with the ability to customize the subject and content. This weakness could be misused by attackers to send convincing phishing emails, making it easier to trick recipients and potentially enabling further harmful actions.
CloudSEK recommends implementing the following measures to prevent such vulnerabilities:
The vulnerabilities in API infrastructure serve as a important reminder of the consequences of inadequate API security. With healthcare data increasingly being digitized, ensuring robust API configurations is no longer optional—it is a fundamental responsibility.In the absence BeVigil, organizations can face an uphill battle against cyber threats. As demonstrated in this blog, a single vulnerability can snowball into a crisis, jeopardizing customer trust, operational stability, and financial health. Thus by integrating BeVigil Enterprise, businesses not only protect their assets but also position themselves as trustworthy custodians of customer data.In a world where data breaches dominate headlines, BeVigil Enterprise is the safeguard every organization needs. Don’t let vulnerabilities define your brand. Choose proactive security with BeVigil.