Today's picture
The Model Context Protocol is becoming an attack surface in its own right. A popular Nginx management tool shipped an MCP integration with a missing authentication check and it is being actively exploited right now across 2,600 publicly exposed instances. Separately, Microsoft's own April patch is booting some Windows Server 2025 systems into BitLocker recovery instead of completing a normal boot, and Booking.com customers are being targeted with follow-on scam calls after a confirmed data breach.
Threat snapshot
3 new · 2 monitoring
New
CVSS 9.8
nginx-ui MCP auth bypass gives attackers full web server control in two requests
Unauthenticated takeover of Nginx configs and traffic. 2,600 exposed instances. Actively exploited. Patch to version 2.3.4 immediately.
New
Ops Alert
Microsoft's April patch is booting Windows Server 2025 into BitLocker recovery
KB5082063 triggers BitLocker recovery on some Windows Server 2025 systems. Verify recovery keys before patching production servers.
New
Breach
Booking.com confirms data breach. Customers now targeted with scam calls using real booking details.
Confirmed breach. Personal and booking data exposed. Threat actors using leaked data for targeted phone phishing campaigns.
Detailed intelligence
Full analysis
01 New CVSS 9.8
nginx-ui MCP authentication bypass gives attackers full web server control in two requests
CVE-2026-33032
What happened
A critical authentication bypass in nginx-ui, the popular open-source web interface for managing Nginx servers with over 430,000 Docker pulls, is being actively exploited in the wild. The flaw, dubbed MCPwn, exists because nginx-ui recently added Model Context Protocol support across two HTTP endpoints. The connection endpoint requires authentication. The command endpoint, which handles every privileged action including writing configuration files and restarting the server, shipped without the authentication check. An attacker needs only two unauthenticated HTTP requests to establish a session and then invoke any MCP tool with full administrative privileges. Threat intelligence firm Recorded Future flagged it as one of the 31 highest-impact vulnerabilities actively exploited in March 2026, assigning it a risk score of 94 out of 100. Shodan scans identify over 2,600 publicly exposed instances. A patch is available in version 2.3.4.
CyberSip™ Take
This item deserves attention beyond its specific CVE. The Model Context Protocol has grown rapidly as a standard for connecting AI tools to infrastructure, and this is now the second confirmed MCP-related exploitation in recent weeks, following the Atlassian MCP server chain disclosed last week. The pattern is worth naming: MCP integrations are being shipped into production tools faster than security review processes are catching up. The authentication gap here is not subtle. It is a missing function call on a high-privilege endpoint. That kind of oversight happens when new features are added quickly without a corresponding security review of the full endpoint surface. Any team running tools with MCP integrations enabled should treat those endpoints as a first-order review priority, not an assumption of security. Nginx sits at the front of most web stacks. An attacker who can rewrite its configuration or redirect its traffic can intercept everything behind it.
Recommended actions
- Update nginx-ui to version 2.3.4 immediately. The fix is a 27-character code change and the patch is minimal and low risk to apply.
- If immediate patching is not possible, add authentication middleware to the /mcp_message endpoint and change the IP whitelist default from allow-all to deny-all
- Review nginx-ui access logs for unexpected requests to /mcp or /mcp_message endpoints, particularly from external IPs
- Audit any tools in your environment that expose MCP endpoints and confirm authentication is enforced on all command-processing paths
Derived from national vulnerability database, vendor security advisories, and threat intelligence reporting
02 New Ops Alert
Microsoft's April patch is sending Windows Server 2025 systems into BitLocker recovery on reboot
KB5082063
What happened
Microsoft confirmed this week that some Windows Server 2025 devices are booting into BitLocker recovery after installing the April 2026 cumulative security update KB5082063. Affected systems prompt for a BitLocker recovery key on reboot rather than completing the normal boot sequence. Microsoft has acknowledged the issue and is investigating. The affected patch is the same update that includes the SharePoint zero-day fix and multiple other critical vulnerability remediations from yesterday's Patch Tuesday. Organizations that have already deployed this update to Windows Server 2025 systems should verify their BitLocker recovery key availability before the next scheduled reboot.
CyberSip™ Take
This is not a security threat in the traditional sense. It is a patch-induced operational failure that security teams need to be aware of for a specific reason. If an affected server reboots and the team cannot locate the BitLocker recovery key, the system becomes inaccessible. In environments where recovery keys are stored in Active Directory, the recovery is straightforward. In environments where key management has been inconsistent, which is more common than most organizations admit, this becomes a genuine outage. The timing is particularly poor because many teams are aggressively deploying the April Patch Tuesday cycle in response to the SharePoint zero-day and other critical remediations from yesterday. The recommendation is not to delay patching, but to verify recovery key availability for Windows Server 2025 systems before each reboot rather than discovering the problem under pressure.
Recommended actions
- Before rebooting any Windows Server 2025 system after applying KB5082063, confirm BitLocker recovery keys are accessible
- Check Active Directory for stored BitLocker recovery keys. Run: Get-BitLockerVolume | Get-BitLockerRecoveryPassword
- If recovery keys cannot be located, suspend BitLocker before applying the update and rebooting, then re-enable after
- Monitor Microsoft's support documentation for a follow-up fix. A remediation update is expected.
Derived from vendor support documentation and April 2026 Patch Tuesday analysis
03 New Breach
Booking.com confirms data breach. Customers now targeted with scam calls using real booking details.
What happened
Booking.com has confirmed a data breach affecting customers globally, including Australia. Personal information and booking details were exposed. Following the breach, customers are being targeted with telephone phishing campaigns where attackers use real booking information including reservation numbers, travel dates, and accommodation details to establish credibility and extract payment or credentials. The breach has been reported across multiple regions and the follow-on social engineering activity is active.
CyberSip™ Take
The breach itself is concerning. The follow-on behavior is what makes this worth elevating in the brief today. Attackers using legitimate reservation details to initiate phone calls represent a significantly higher-fidelity social engineering threat than generic phishing. A caller who knows your hotel name, check-in date, and booking reference number does not need to work hard to establish trust. Most recipients will assume the call is legitimate before any suspicious request is even made. This attack pattern has been used effectively against hotel customers in previous campaigns and scales efficiently once the data is in attacker hands. Organizations should brief travel-heavy staff on this specific threat. Booking.com will not call to request payment or credential changes. Any inbound call referencing booking details and requesting action should be terminated and verified through the Booking.com app directly.
Recommended actions
- Alert staff who travel frequently or book through Booking.com, particularly executives and customer-facing teams
- Any inbound call referencing booking details and requesting payment or account action should be treated as suspicious regardless of how much detail the caller knows
- Verify any requests by logging into Booking.com directly through the app or official website. Never act on links provided by a caller.
- Monitor for credential reuse if employees use the same password across Booking.com and corporate accounts
Derived from confirmed vendor breach notifications and threat intelligence reporting
Still watching
Aging items · days 2–6
Items here remain operationally relevant. No significant new developments since last issue. They drop off after 7 days.
SharePoint CVE-2026-32201 (Issue 4). Patch released April 14. Apply immediately if not already deployed to internet-facing instances.
Day 2
Windows IKE CVE-2026-33824 CVSS 9.8 (Issue 4). No confirmed exploitation yet. Patch remains high priority for systems with IKE v2 exposed.
Day 2
Exchange Server 2016/2019 ESU expired (Issue 4). Migration urgency unchanged. Storm-1175 actively targeting these versions for Medusa deployment.
Day 2
Cross-source standouts
What connects this week
01
MCP is the new attack surface. Two confirmed exploitations in a week.
The nginx-ui authentication bypass and last week's Atlassian MCP server chain are not isolated incidents. They represent a pattern in how MCP integrations are being built and deployed: quickly, with the security review of new endpoints trailing behind the feature development. MCP is designed to give AI agents administrative access to production systems. That design goal makes authentication on every endpoint non-negotiable, not optional. Teams adopting MCP tooling should audit the authentication posture of every MCP endpoint in their environment before the next disclosure arrives.
02
Data breaches don't end at the notification. The follow-on attack is often worse.
The Booking.com breach is a useful reminder that the breach itself is often the setup, not the punchline. Exposed booking data has limited standalone value. Combined with a phone call from someone who sounds like they work for the company and knows your reservation details, it becomes a convincing social engineering attack that bypasses most technical controls. Organizations with high-travel employee populations should treat breach notifications from travel platforms as a social engineering pre-alert, not just a data hygiene issue.
Past issues · 7-day archive