← Back to feed

MCP Infrastructure Security Audit: 43% of Servers Vulnerable to Command Execution; Widespread Configuration Failures Across Production Deployments

Date: 2026-04-18
Tags: malicious-tool

Executive Summary

A practitioner's analysis published in April 2026 exposes systemic security flaws in the infrastructure underpinning the rapidly expanding agentic AI landscape. 43% of public servers are vulnerable to command execution, 36.7% of 7,000+ servers are vulnerable to SSRF, 492 servers are exposed to the internet with zero authentication, and 53% of servers use static credentials.

Campaign Summary

FieldDetail
Campaign / MalwareMCP Infrastructure Security Crisis
AttributionUnknown (confidence: none)
TargetOrganizations running Model Context Protocol (MCP) servers in production environments; AI agent deployments across enterprises
VectorInsecure MCP server configuration; credential exposure; overprivileged capabilities; authentication bypass
Statusactive
First Observed2026-04-01

Detailed Findings

The security crisis is three overlapping attack surfaces: Tool Poisoning embeds malicious instructions in tool descriptions—metadata the LLM reads when deciding which tool to call, and the poisoned tool doesn't need to be called; its description gets injected into the context window when the agent connects. Researchers demonstrated this on Cursor, where a poisoned tool description caused an agent to read the user's ~/.cursor/mcp.json and SSH keys, then exfiltrate them. When multiple MCP servers connect to the same agent, all tool descriptions coexist in one LLM context with no isolation. A malicious server can inject descriptions that override trusted servers' tools. Researchers successfully redirected all emails to attacker-controlled addresses even when users specified different recipients. The author concludes that the agentic AI ecosystem is growing faster than anyone can secure it, and we need to build security into the protocol, not bolt it on afterward.

MITRE ATT&CK Mapping

TechniqueIDContext
T1566T1566.002Phishing—tool poisoning embeds malicious instructions in tool metadata that LLM agents process
T1190T1190Exploit Public-Facing Application—SSRF vulnerabilities in 36.7% of MCP servers enable cloud metadata access
T1078T1078.001Valid Accounts—492 servers exposed with zero authentication; 53% use static credentials vulnerable to credential harvesting

IOCs

Domains

_No specific IOCs published in source. Audit based on public server enumeration and security posture analysis._

Full URL Paths

_No specific IOCs published in source. Audit based on public server enumeration and security posture analysis._

Splunk Format

_No IOCs available for Splunk query_

Package Indicators

MCP servers (multiple vendors)

Detection Recommendations

Credential Isolation: Never store credentials in mcp.json files; use environment variables or secure secret managers. Continuous Monitoring: Log every tool call, context injection, and LLM instruction for anomaly detection. Organizations should conduct security audits of all connected MCP servers, disable unnecessary capabilities, implement network-level isolation between MCP servers, enforce authentication on all MCP endpoints, scan tool descriptions for prompt injection payloads, and maintain an inventory of all agent-connected MCP servers with security posture scoring.

References