BACK TO ARCHIVE
2026-03-29P1 CRITICAL
CASE #0075

Bootstrap Code Replay Lets Attackers Claim Pending Pairings

In openclaw versions up to and including 2026.3.12, device bootstrap codes could be replayed indefinitely against pending pairings, allowing an attacker who observed a code once to gain admin access at any time before the legitimate user completed pairing.

CONFIRMED
🔓 SECURITY LEAK
Incident Brief

When a user initiated device pairing, OpenClaw issued a bootstrap code intended for single-use consumption by the paired device. In versions up to 2026.3.12, the server did not invalidate the code on use and did not bind it to a device fingerprint. An attacker who observed a bootstrap code (e.g., via screen-share, browser history, or a compromised clipboard manager) could replay it any time before the legitimate device completed pairing — or even after, in some edge cases — to claim the pending admin pairing for themselves. Exploitation required only network access to the target instance and a captured code.

Root Cause

The Actual Culprit

Bootstrap codes were treated as identifiers rather than capability tokens. No single-use enforcement, no device binding, no TTL below 'pairing window'.

What Was Done
[OK]Single-use enforcement: code invalidated on first redemption attempt
[OK]Code binds to requesting device fingerprint
[OK]5-minute TTL on all pairing codes
[OK]Advisory: invalidate all outstanding codes in affected installs
Lessons Learned
key

Treat bootstrap secrets as capability tokens

Single-use, short TTL, and device-bound. Anything less is a bearer token, and bearer tokens leak.

shield

Pairing is the highest-stakes flow in the product

If getting through pairing grants admin, pairing is an auth event. Defense-in-depth (MFA, out-of-band confirmation) belongs here.

Comments (0)

Loading comments...

0/1000
Case Info
Case Number
#0075
Severity
🔥P1 CRITICAL
Severity Level
Date
2026-03-29
Affected Systems
• Device Pairing Service
• Authorization Layer
Source
twitter
Published: 2026-03-29