AUTO-UPDATED

Anthropic won't own MCP 'design flaw' putting 200K servers at risk, researcher says

Security researchers from Ox report that a design flaw in Anthropic’s Model Context Protocol potentially exposes 200,000 servers to remote code execution, though Anthropic maintains the behavior is expected.

Key Points

  • The Model Context Protocol (MCP) vulnerability allows unauthenticated attackers to execute arbitrary OS commands on servers running AI applications.
  • Researchers identified four distinct attack vectors, including command injection, hardening bypasses, and zero-click prompt injection affecting various AI development environments.
  • Affected software includes popular frameworks and tools such as LangFlow, Flowise, Upsonic, and GPT Researcher, with multiple CVEs issued to date.
  • Ox researchers successfully demonstrated the risk by poisoning nine out of 11 MCP marketplaces with proof-of-concept code.
  • Anthropic has declined to modify the protocol's architecture, instead updating security guidance to advise developers to use STDIO-based MCP adapters with caution.

Why it Matters

This dispute highlights a significant tension between AI vendors and the security community regarding the responsibility for securing foundational protocols. If left unpatched, these architectural flaws could facilitate widespread system compromises across the rapidly growing ecosystem of AI-integrated development tools and agents.
Theregister.com Published by Jessica Lyons
Read original