Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
15,200 OpenClaw Systems at Risk Due to Internet Exposure

15,200 OpenClaw Systems at Risk Due to Internet Exposure

Posted on February 10, 2026 By CWS

Recent findings have highlighted a significant security breach impacting 15,200 OpenClaw control panels, with full system access available to potential attackers. This revelation underscores a serious vulnerability in the expanding ‘agentic AI’ domain, revealing how personal and corporate AI assistants have been left unprotected on the public internet.

The Scope of the Exposure

The SecurityScorecard STRIKE Threat Intelligence Team has identified that these OpenClaw instances are open to Remote Code Execution (RCE) attacks, potentially allowing complete control over host machines. A survey by STRIKE found 42,900 unique IP addresses with exposed OpenClaw panels across 82 countries, with many being personal computers or cloud-hosted AI agents unintentionally made accessible due to default settings.

The core issue arises from OpenClaw’s default network configuration, which utilizes 0.0.0.0:18789, listening on all network interfaces, rather than the more secure 127.0.0.1. This misconfiguration effectively broadcasts the control panels globally, making them vulnerable to exploitation.

Identified Vulnerabilities

Several severe vulnerabilities have been identified in older versions of OpenClaw, exacerbating the issue. These include CVE-2026-25253, a ‘1-click’ RCE flaw with a CVSS score of 8.8, allowing attackers to gain control via malicious links. Additionally, CVE-2026-25157 presents an SSH command injection vulnerability, and CVE-2026-24763, a Docker sandbox escape, poses significant threats.

Despite the release of patches in version 2026.1.29, a staggering 78% of exposed instances continue to operate on outdated versions, known as ‘Clawdbot’ or ‘Moltbot’, leaving them susceptible to these risks. The potential damage is amplified given that AI agents manage sensitive tasks, such as accessing emails and executing code.

Immediate Mitigation Measures

To combat these vulnerabilities, users are urged to update to version 2026.2.1 or later, which addresses the identified RCE issues. Key defensive steps include ensuring the software binds to localhost by setting the configuration to gateway.bind: “127.0.0.1”, rotating all stored credentials, and utilizing secure tunnels like Tailscale or Cloudflare Tunnel for remote access.

Security teams are advised to block port 18789 and monitor for unusual command-and-control traffic from internal machines. The STRIKE team also provides a ‘Declawed’ dashboard for real-time updates on vulnerable instances, allowing users to track remediation efforts.

The prevalence of advanced persistent threats (APTs), such as Kimsuky and APT28, near these exposed systems highlights the critical need for swift action. Approximately 33.8% of the exposed infrastructure is linked to known threat activities, emphasizing the urgency of securing OpenClaw deployments against potential exploitation.

Cyber Security News Tags:AI agents, AI security, APT groups, Breach, CVE, Cybersecurity, internet exposure, OpenClaw, OpenClaw exposure, RCE vulnerability, security patch, security update, STRIKE team, threat intelligence, Vulnerabilities

Post navigation

Previous Post: European Commission Thwarts Cyber-Attack on Mobile Data
Next Post: Revolutionary Open-source LLM Vulnerability Scanner Launched

Related Posts

ChatGPT “0-Click” Vulnerability in Connectors Exposed Sensitive Google Drive Data ChatGPT “0-Click” Vulnerability in Connectors Exposed Sensitive Google Drive Data Cyber Security News
Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender Cyber Security News
New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads New EggStreme Malware With Fileless Capabilities Leverages DLL Sideloading to Execute Payloads Cyber Security News
Linux Kernel 6.18-rc1 Released With Extensive Updates Following a Steady Merge Window Linux Kernel 6.18-rc1 Released With Extensive Updates Following a Steady Merge Window Cyber Security News
Critical Apache StreamPipes Vulnerability Let Attackers Seize Admin Control Critical Apache StreamPipes Vulnerability Let Attackers Seize Admin Control Cyber Security News
Threat Actors Advertising ‘MioLab MacOS’ Infostealer on an Underground Forum Threat Actors Advertising ‘MioLab MacOS’ Infostealer on an Underground Forum Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News