← Volver a CVEs
CVE-2026-32064
HIGH7.7
Descripcion
OpenClaw versions prior to 2026.2.21 sandbox browser entrypoint launches x11vnc without authentication for noVNC observer sessions, allowing unauthenticated access to the VNC interface. Remote attackers on the host loopback interface can connect to the exposed noVNC port to observe or interact with the sandbox browser without credentials.
Detalles CVE
Puntuacion CVSS v3.17.7
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado3/21/2026
Ultima modificacion3/24/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
openclaw:openclaw
Debilidades (CWE)
CWE-306
Referencias
https://github.com/openclaw/openclaw/commit/621d8e1312482f122f18c43c72c67211b141da01(disclosure@vulncheck.com)
https://github.com/openclaw/openclaw/commit/8c1518f0f3e0533593cd2dec3a46c9b746753661(disclosure@vulncheck.com)
https://github.com/openclaw/openclaw/security/advisories/GHSA-25gx-x37c-7pph(disclosure@vulncheck.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.