<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Network-AI (&lt;= 5.1.2) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/network-ai--5.1.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/network-ai--5.1.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>Network-AI Unauthenticated Access to MCP HTTP Endpoint</title><link>https://feed.craftedsignal.io/briefs/2024-01-network-ai-auth-bypass/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-network-ai-auth-bypass/</guid><description>Network-AI is vulnerable to missing authentication on the MCP HTTP endpoint, allowing unauthenticated privileged tool calls that could lead to configuration changes and agent manipulation.</description><content:encoded><![CDATA[<p>The <code>Jovancoding/Network-AI</code> project is susceptible to a critical vulnerability due to missing authentication on the MCP HTTP endpoint. This flaw, present in version 5.1.2 and earlier (commit <code>c344f2053eb0d49395988f803bf92f2a86b2a0d0</code>), allows unauthenticated access to the orchestrator&rsquo;s management tools. The default bind address of <code>0.0.0.0</code> exacerbates the issue, enabling any party with network reachability to enumerate and invoke privileged functions. This includes reading and mutating the live orchestrator configuration, listing registered agents, creating/revoking security tokens, and adjusting global budget ceilings, posing a significant risk to the system&rsquo;s integrity and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains network access to the Network-AI instance.</li>
<li>The attacker sends an HTTP GET request to <code>/tools</code> endpoint (e.g., <code>http://localhost:13001/tools</code>) to enumerate available tools.</li>
<li>The server responds with a list of available tools including <code>config_get</code>, <code>config_set</code>, <code>agent_list</code>, etc.</li>
<li>The attacker crafts a JSON-RPC <code>tools/call</code> request to the <code>/mcp</code> endpoint (e.g., <code>http://localhost:13001/mcp</code>) without any authentication headers.</li>
<li>The attacker specifies the desired tool name (<code>config_get</code>, <code>config_set</code>, <code>agent_list</code>, etc.) and arguments within the JSON-RPC request body.</li>
<li>The server processes the request and dispatches the call to the orchestrator&rsquo;s tool registry without authentication.</li>
<li>The attacker can now read sensitive configuration data using <code>config_get</code> or modify the configuration using <code>config_set</code>.</li>
<li>The attacker can further enumerate agents or manipulate the system by using available tool calls like <code>agent_list</code>, <code>agent_spawn</code>, and <code>agent_stop</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to completely compromise the Network-AI orchestrator. Unauthenticated network access enables full enumeration and invocation of the orchestrator&rsquo;s management functionality. An attacker can change runtime configuration (e.g., <code>defaultTimeout</code>, <code>enableTracing</code>), dispatch or stop agents, mutate the shared blackboard, mint or revoke security tokens, and adjust global budget ceilings. The default <code>0.0.0.0</code> bind increases the likelihood of accidental exposure on any host with a routable interface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Unauthenticated Access to Network-AI MCP Endpoint&rdquo; to identify suspicious requests to the <code>/mcp</code> endpoint without authentication (see rule below).</li>
<li>Monitor web server logs for HTTP requests to <code>/tools</code> and <code>/mcp</code> endpoints originating from unexpected IP addresses, especially those outside the internal network.</li>
<li>Apply remediation steps suggested by the vendor, including enforcing authentication on the <code>/mcp</code> endpoint and restricting the bind address to <code>127.0.0.1</code>.</li>
<li>Use the IOCs provided in this brief to identify potential exploitation attempts by blocking access to the identified URLs and IP addresses.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cwe-306</category><category>authentication-bypass</category><category>network-ai</category></item></channel></rss>