Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
15,200 OpenClaw Systems at Risk Due to Internet Exposure

15,200 OpenClaw Systems at Risk Due to Internet Exposure

Posted on February 10, 2026 By CWS

Recent findings have highlighted a significant security breach impacting 15,200 OpenClaw control panels, with full system access available to potential attackers. This revelation underscores a serious vulnerability in the expanding ‘agentic AI’ domain, revealing how personal and corporate AI assistants have been left unprotected on the public internet.

The Scope of the Exposure

The SecurityScorecard STRIKE Threat Intelligence Team has identified that these OpenClaw instances are open to Remote Code Execution (RCE) attacks, potentially allowing complete control over host machines. A survey by STRIKE found 42,900 unique IP addresses with exposed OpenClaw panels across 82 countries, with many being personal computers or cloud-hosted AI agents unintentionally made accessible due to default settings.

The core issue arises from OpenClaw’s default network configuration, which utilizes 0.0.0.0:18789, listening on all network interfaces, rather than the more secure 127.0.0.1. This misconfiguration effectively broadcasts the control panels globally, making them vulnerable to exploitation.

Identified Vulnerabilities

Several severe vulnerabilities have been identified in older versions of OpenClaw, exacerbating the issue. These include CVE-2026-25253, a ‘1-click’ RCE flaw with a CVSS score of 8.8, allowing attackers to gain control via malicious links. Additionally, CVE-2026-25157 presents an SSH command injection vulnerability, and CVE-2026-24763, a Docker sandbox escape, poses significant threats.

Despite the release of patches in version 2026.1.29, a staggering 78% of exposed instances continue to operate on outdated versions, known as ‘Clawdbot’ or ‘Moltbot’, leaving them susceptible to these risks. The potential damage is amplified given that AI agents manage sensitive tasks, such as accessing emails and executing code.

Immediate Mitigation Measures

To combat these vulnerabilities, users are urged to update to version 2026.2.1 or later, which addresses the identified RCE issues. Key defensive steps include ensuring the software binds to localhost by setting the configuration to gateway.bind: “127.0.0.1”, rotating all stored credentials, and utilizing secure tunnels like Tailscale or Cloudflare Tunnel for remote access.

Security teams are advised to block port 18789 and monitor for unusual command-and-control traffic from internal machines. The STRIKE team also provides a ‘Declawed’ dashboard for real-time updates on vulnerable instances, allowing users to track remediation efforts.

The prevalence of advanced persistent threats (APTs), such as Kimsuky and APT28, near these exposed systems highlights the critical need for swift action. Approximately 33.8% of the exposed infrastructure is linked to known threat activities, emphasizing the urgency of securing OpenClaw deployments against potential exploitation.

Cyber Security News Tags:AI agents, AI security, APT groups, Breach, CVE, Cybersecurity, internet exposure, OpenClaw, OpenClaw exposure, RCE vulnerability, security patch, security update, STRIKE team, threat intelligence, Vulnerabilities

Post navigation

Previous Post: European Commission Thwarts Cyber-Attack on Mobile Data
Next Post: Revolutionary Open-source LLM Vulnerability Scanner Launched

Related Posts

Critical SolarWinds Serv-U Vulnerabilities Let Attackers Execute Malicious Code Remotely as Admin Critical SolarWinds Serv-U Vulnerabilities Let Attackers Execute Malicious Code Remotely as Admin Cyber Security News
New Malware Loader ‘CountLoader’ Weaponized PDF File to Deliver Ransomware New Malware Loader ‘CountLoader’ Weaponized PDF File to Deliver Ransomware Cyber Security News
Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions Cyber Security News
Critical Roundcube Flaw Allows Email Tracking Critical Roundcube Flaw Allows Email Tracking Cyber Security News
New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains Cyber Security News
Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Ransomware Threats BQTLock and GREENBLOOD Emerge
  • Ivanti Releases Crucial Patches for Endpoint Manager
  • Cybercriminals Exploit AI to Distribute macOS Malware
  • Microsoft to Update Windows Secure Boot in 2026
  • Critical SandboxJS Flaw Raises Security Concerns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Ransomware Threats BQTLock and GREENBLOOD Emerge
  • Ivanti Releases Crucial Patches for Endpoint Manager
  • Cybercriminals Exploit AI to Distribute macOS Malware
  • Microsoft to Update Windows Secure Boot in 2026
  • Critical SandboxJS Flaw Raises Security Concerns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark