Security for Legal SaaS

Episode 3 · Module 1 · Foundations

Attack Surfaces in Legal Tech

18 May 2026 · 8:58 · Security for Legal SaaS

0:00 8:58

An attack surface is every point where an attacker can get in or pull data out. In this episode, Alice and Dan map the seven major surfaces of a legal AI SaaS platform — from the web application layer through document ingestion, LLM integrations, and internal admin tools. They examine why adversary-supplied documents make legal tech uniquely dangerous, walk through the Proskauer Rose incident, and outline practical reduction strategies.

Today’s Lesson

Every Entry Point Is a Promise to Attackers

An attack surface is the sum total of all points where an unauthorised user can attempt to enter or extract data from a system. OWASP defines it as1 “all of the different points where an attacker could get into a system, and where they could get data out.” NIST SP 800-53 control SA-15(5)2 frames attack surface reduction as “giving attackers less opportunity to exploit weaknesses.”

Key stat: Exploitation of vulnerabilities as an initial access vector increased 180% in the 2024 Verizon DBIR,3 driven primarily by web application flaws.

Anatomy of a Legal Tech Attack Surface

Attack Surface Entry Points Primary Threat
Web ApplicationLogin pages, document viewers, admin panelsCredential stuffing, XSS, session hijacking
API LayerREST/GraphQL endpoints, webhooks, OAuth callbacksBOLA, injection, broken authentication
DatabaseConnection strings, query interfaces, backupsSQL injection, credential theft
Object StorageS3/Blob buckets, pre-signed URLs, CDN originsMisconfiguration, over-permissive ACLs
LLM IntegrationsPrompt endpoints, RAG pipelines, embeddingsPrompt injection, data poisoning
Email SystemsSMTP relay, IMAP ingestion, OAuth tokensPhishing relay, token theft
Document IngestionUpload endpoints, file parsers, format convertersMalicious payloads, parser exploits, XXE

The Document Ingestion Pipeline: Your Most Dangerous Surface

Most SaaS applications receive trusted input from their own users. Legal tech receives adversary-supplied content as a core workflow. Opposing counsel sends contracts. Third parties attach evidence. Clients forward hostile correspondence.

Case study — PDF exploits: CVE-2023-26369 demonstrated4 that a crafted PDF could achieve arbitrary code execution through a heap-based buffer overflow. Apache Tika has faced XXE injection through XFA content embedded in PDFs,5 allowing attackers to access local files and internal network resources from the parser itself.

What Makes Legal Document Ingestion Uniquely Dangerous

  1. The sender is often adversarial by design. In litigation, opposing counsel has a direct interest in the outcome.
  2. Documents traverse the entire stack. An uploaded contract touches web server, object storage, parser, AI pipeline, database, and notifications.
  3. Content becomes trusted input downstream. Once parsed, document text feeds into search indexes, AI models, and reporting.
  4. Format complexity creates parser attack surface. DOCX files are ZIP archives containing XML. PDFs can embed JavaScript and arbitrary binary streams.

The Distinctive Threat Profile of Legal Tech

ABA Formal Opinion 477R6 requires lawyers to make reasonable efforts to prevent unauthorised access to client information. The platform bears professional-conduct-grade obligations. A BOLA vulnerability7 — number one on the OWASP API Security Top 10, roughly 40% of API attacks — in a legal platform exposes privileged communications belonging to non-users who never consented to the platform handling their information.

The Proskauer Rose Incident

In April 2023, Proskauer Rose exposed approximately 184,000 files8 containing private M&A documents, NDAs, and financial deals on an unsecured Microsoft Azure cloud server for six months. Indexed by GrayHatWarfare and accessible to anyone with the URL. One misconfigured object storage bucket — one row in the attack surface table — causing catastrophic privilege breach across hundreds of matters.

LLM Integration: The Newest Attack Surface

The OWASP Top 10 for LLM Applications (2025)9 catalogues risks specific to language model integrations. The fundamental problem: LLMs cannot reliably distinguish data from instructions. When your AI processes a contract from opposing counsel, the contract’s content is data — but the LLM may treat embedded text as instructions.

Internal Attack Surfaces: The Admin Panel Problem

INC Ransomware’s 2024 campaign against law firms10 exploited vulnerabilities in remote management tools — Citrix, Fortinet, SimpleHelp — to gain initial access. They didn’t attack the main application. They attacked the admin tools.

Attack Surface Reduction: Least Exposure

Action What It Eliminates
Disable unused API endpointsOrphaned routes with stale auth
Remove default admin panels from productionPredictable URL attack surface
Restrict object storage to private + pre-signed URLsPublic bucket enumeration
Network-segment AI inference servicesLateral movement from LLM to DMS
Enforce allowlist-only file formatsParser exploit surface for exotic formats
Require VPN/zero-trust for all internal toolsNetwork-exposed admin interfaces

Ransomware attacks on law firms increased 30% in Q1 2024,13 with average demands exceeding $500,000. The cheapest defence is removing things attackers could target. You can’t exploit a service that isn’t running.

Conclusion

Map every surface. Reduce what you can. Isolate what remains so that breaching one surface doesn’t give access to others. Legal tech has an attack surface unlike any other vertical — your users receive adversary-supplied content by design, your data carries professional-conduct obligations, and your AI integrations create novel exploitation pathways.

Sources & references

  1. OWASP, “Attack Surface Analysis Cheat Sheet”
  2. NIST SP 800-53 Rev. 5, Control SA-15(5): Attack Surface Reduction
  3. Verizon, 2024 Data Breach Investigations Report — 180% increase in vulnerability exploitation
  4. ThreatLocker, “CVE-2023-26369: One-click PDF exploits”
  5. GBHackers, “Apache Tika Core Flaw” — XXE injection through XFA content
  6. ABA Formal Opinion 477R, “Securing Communication of Protected Client Information”
  7. OWASP, “API1: Broken Object Level Authorization” — ~40% of API attacks
  8. TechCrunch, “Proskauer exposed clients’ confidential M&A data,” April 2023 — 184,000 files
  9. OWASP, “Top 10 for Large Language Model Applications (2025)”
  10. Halcyon, “INC Ransom Group Mounts Rapid Campaign Against Law Firms,” 2024
  11. CrowdStrike, “What is Attack Surface Reduction?”
  12. CISA, “Primary Mitigations to Reduce Cyber Threats”
  13. ProcessBolt, “Why Law Firm Data Breaches Are Skyrocketing in 2024” — 30% increase; $500K average demands