Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

April 17, 2026

OpenClaw Exposes the Real Cybersecurity Risks of Agentic AI

April 17, 2026

DDoS-For-Hire Services Disrupted by International Police Action

April 17, 2026
Facebook X (Twitter) Instagram
Saturday, April 18
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads
Cyber Security

Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads

Team-CWDBy Team-CWDApril 17, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security researchers have warned of a “critical, systemic” vulnerability in the model context protocol (MCP) which could have a significant impact on the AI supply chain.

MCP is a popular open source standard created by Anthropic which allows AI models to connect to external data and systems.

However, in a report published on April 15, researchers at Ox Security claimed that a flaw in the protocol could enable arbitrary command execution on any vulnerable system, handing attackers access to sensitive user data, internal databases, API keys, and chat histories.

“This is not a traditional coding error,” warned the vendor.

“It is an architectural design decision baked into Anthropic’s official MCP SDKs across every supported programming language, including Python, TypeScript, Java, and Rust. Any developer building on the Anthropic MCP foundation unknowingly inherits this exposure.”

It said that over 200 open source projects, 150 million downloads, 7000+ publicly accessible servers and up to 200,000 vulnerable instances in total could be exposed by the vulnerability.

Read more on MCP: Hundreds of MCP Servers at Risk of RCE and Data Leaks.

According to Ox Security, the exploit mechanism is fairly straightforward.

“MCP’s STDIO interface was designed to launch a local server process. But the command is executed regardless of whether the process starts successfully,” it explained. “Pass in a malicious command, receive an error – and the command still runs. No sanitization warnings. No red flags in the developer toolchain. Nothing.”

In effect, this could result in complete takeover of a target’s system.

Who’s to Blame?

Ox Security said it has repeatedly tried to persuade Anthropic to patch the vulnerability. However, according to the report, the AI giant said that this was “expected behavior.”

“Anthropic confirmed the behavior is by design and declined to modify the protocol, stating the STDIO execution model represents a secure default and that sanitization is the developer’s responsibility,” Ox Security said.

The company argued that pushing responsibility onto developers for securing their code, instead of securing the infrastructure it runs on, is dangerous given the community’s track record on security.

In the meantime, Ox Security has issued over 30 responsible disclosures and discovered over 10 high or critical-severity CVEs, to help patch individual open source projects.

Kevin Curran, IEEE senior member and professor of cybersecurity at Ulster University, said the research exposed “a shocking gap in the security of foundational AI infrastructure” and that the researchers did the right thing.

“We are trusting these systems with increasingly sensitive data and real-world actions. If the very protocol meant to connect AI agents is this fragile and its creators will not fix it then every company and developer building on top of it needs to treat this as an immediate wake-up call,” he added.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAPK Malformation Found in Thousands of Android Malware Samples
Next Article Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems
Team-CWD
  • Website

Related Posts

Cyber Security

OpenClaw Exposes the Real Cybersecurity Risks of Agentic AI

April 17, 2026
Cyber Security

Cookeville Hospital Discloses Rhysida Breach Hitting 337,917

April 16, 2026
Cyber Security

AI Companies To Play Bigger Role in CVE Program, Says CISA

April 16, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Your information is on the dark web. What happens next?

January 13, 2026

Is Poshmark safe? How to buy and sell without getting scammed

February 19, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.