A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-26327

CVE-2026-26327: OpenClaw Auth Bypass Vulnerability

CVE-2026-26327 is an authentication bypass flaw in OpenClaw personal AI assistant that lets attackers on untrusted LANs intercept credentials via rogue service advertisements. This article covers technical details, risks, and fixes.

Published: February 20, 2026

CVE-2026-26327 Overview

CVE-2026-26327 is a high-severity vulnerability affecting OpenClaw, a personal AI assistant application. The vulnerability exists in the handling of discovery beacons (Bonjour/mDNS and DNS-SD) where TXT records containing sensitive routing information such as lanHost, tailnetDns, gatewayPort, and gatewayTlsSha256 are treated as authoritative inputs despite being unauthenticated. This insufficient verification of data authenticity (CWE-345) allows attackers on shared or untrusted local networks to spoof service discovery records and redirect client connections to malicious endpoints.

Critical Impact

Attackers on shared LANs can advertise rogue _openclaw-gw._tcp services, causing clients to connect to attacker-controlled endpoints, potentially exfiltrating Gateway credentials including auth.token and auth.password during the connection process.

Affected Products

  • OpenClaw iOS client (alpha builds prior to version 2026.2.14)
  • OpenClaw Android client (alpha builds prior to version 2026.2.14)
  • OpenClaw macOS client (prior to version 2026.2.14)

Discovery Timeline

  • 2026-02-19 - CVE CVE-2026-26327 published to NVD
  • 2026-02-19 - Last updated in NVD database

Technical Details for CVE-2026-26327

Vulnerability Analysis

The vulnerability stems from OpenClaw clients improperly trusting unauthenticated TXT records received via mDNS/DNS-SD service discovery. When clients on iOS and macOS received discovery beacons, they used TXT-provided host hints (lanHost/tailnetDns) and port values (gatewayPort) to construct connection URLs without proper validation. More critically, iOS and Android clients allowed discovery-provided TLS fingerprints (gatewayTlsSha256) to override previously stored TLS pins, effectively bypassing certificate pinning protections.

This design flaw enables man-in-the-middle attacks where an adversary on the same network segment can advertise a malicious service instance. The attack requires adjacent network access, making it particularly dangerous in shared network environments such as public WiFi, corporate guest networks, or co-working spaces.

Root Cause

The root cause is insufficient verification of data authenticity (CWE-345) in the service discovery implementation. The application architecture incorrectly assumed that mDNS TXT records were trustworthy sources for security-critical routing and certificate pinning information. This violated the security principle that network-provided data should never be implicitly trusted, especially when it affects connection security decisions.

Additionally, Android builds had hostname verification globally disabled, further weakening the TLS security posture and making certificate spoofing attacks more feasible.

Attack Vector

This vulnerability requires adjacent network access to exploit. An attacker must be positioned on the same local network as the victim to broadcast malicious mDNS/DNS-SD responses.

The attack follows this sequence: First, the attacker establishes presence on a shared network where potential victims use OpenClaw clients. They then advertise a rogue _openclaw-gw._tcp service with TXT records containing the attacker's endpoint information and a malicious TLS certificate fingerprint. When a vulnerable OpenClaw client performs service discovery, it receives the spoofed TXT records and uses them to build its connection URL. The client connects to the attacker-controlled endpoint and, due to the TLS pin override behavior, accepts the attacker's certificate. During the connection handshake, Gateway credentials (auth.token / auth.password) are transmitted to the malicious endpoint.

The practical impact is currently limited primarily to developers and testers running alpha builds, as the iOS and Android apps have not been publicly released on the App Store or Play Store. However, any shipped clients relying on discovery on shared or untrusted LANs remain at risk.

Detection Methods for CVE-2026-26327

Indicators of Compromise

  • Unexpected mDNS traffic advertising _openclaw-gw._tcp services from unknown or suspicious source IP addresses on the local network
  • Multiple competing service discovery responses for OpenClaw gateway services with differing TXT record values
  • Connection attempts from OpenClaw clients to unfamiliar IP addresses or non-standard ports that do not correspond to legitimate gateway infrastructure
  • TLS certificate warnings or unexpected certificate changes when connecting to OpenClaw services

Detection Strategies

  • Monitor network traffic for anomalous mDNS (port 5353) broadcasts advertising _openclaw-gw._tcp services, particularly from endpoints not part of your authorized infrastructure
  • Implement network segmentation and mDNS filtering at the network perimeter to prevent cross-segment service discovery spoofing
  • Deploy endpoint detection to identify OpenClaw client versions and flag installations running vulnerable alpha builds prior to 2026.2.14
  • Analyze authentication logs for credential usage patterns that suggest compromise, such as gateway tokens being used from unexpected IP addresses

Monitoring Recommendations

  • Enable detailed logging for mDNS service discovery events on endpoints running OpenClaw clients to establish baselines and detect anomalies
  • Implement network intrusion detection rules to alert on mDNS responses containing gatewayTlsSha256 TXT records from unauthorized hosts
  • Monitor for credential rotation patterns that may indicate compromised auth.token or auth.password values

How to Mitigate CVE-2026-26327

Immediate Actions Required

  • Upgrade all OpenClaw clients to version 2026.2.14 or later immediately
  • Rotate any Gateway credentials (auth.token and auth.password) that may have been exposed on untrusted networks
  • Avoid using OpenClaw on shared or untrusted networks until patching is complete
  • Review network security policies to restrict mDNS traffic where feasible

Patch Information

Version 2026.2.14 addresses this vulnerability through multiple security improvements. Clients now prefer the resolved service endpoint (SRV + A/AAAA records) over TXT-provided routing hints. Discovery-provided fingerprints no longer override stored TLS pins. In iOS and Android, first-time TLS pins require explicit user confirmation with the fingerprint displayed, eliminating silent Trust-On-First-Use (TOFU) behavior. Discovery-based direct connections are now TLS-only. In Android, hostname verification is no longer globally disabled and is only bypassed when pinning is explicitly configured.

For detailed patch information, see the GitHub Security Advisory GHSA-pv58-549p-qh99, the GitHub Release v2026.2.14, and the GitHub Commit Details.

Workarounds

  • Disable mDNS/Bonjour service discovery in OpenClaw client configuration and manually configure gateway endpoints where supported
  • Use VPN connections when operating on untrusted networks to isolate mDNS traffic from potential attackers
  • Implement network-level mDNS filtering using firewall rules to block unsolicited mDNS responses from unknown hosts on shared network segments
  • Restrict OpenClaw usage to trusted network environments until the patch can be applied

Network administrators can implement mDNS filtering at the network level to reduce exposure. For environments where automatic service discovery is not required, consider disabling mDNS entirely on client endpoints or restricting it to specific trusted interfaces.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechOpenclaw

  • SeverityHIGH

  • CVSS Score7.1

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-345
  • Technical References
  • GitHub Commit Details

  • GitHub Release v2026.2.14

  • GitHub Security Advisory GHSA-pv58-549p-qh99
  • Related CVEs
  • CVE-2026-26325: OpenClaw AI Auth Bypass Vulnerability

  • CVE-2026-26319: OpenClaw Auth Bypass Vulnerability

  • CVE-2026-26316: OpenClaw Authentication Bypass Vulnerability

  • CVE-2026-25474: Openclaw Auth Bypass Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use