<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Device-Pairing — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/device-pairing/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 13:17:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/device-pairing/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Bootstrap Code Replay Vulnerability (CVE-2026-32987)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-replay/</link><pubDate>Sun, 29 Mar 2026 13:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-replay/</guid><description>OpenClaw before 2026.3.13 is vulnerable to a replay attack during device pairing verification, allowing attackers to repeatedly verify a bootstrap code and escalate privileges to operator.admin.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.3.13 contains a vulnerability in the device pairing verification process.  Specifically, the <code>src/infra/device-bootstrap.ts</code> file allows bootstrap setup codes to be replayed. This means an attacker can repeatedly use the same valid bootstrap code before it is approved, leading to an escalation of pending pairing scopes. The most critical outcome is privilege escalation to the <code>operator.admin</code> level, granting the attacker significant control over the affected system…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>replay-attack</category><category>privilege-escalation</category><category>device-pairing</category></item></channel></rss>