Zero-Click RCE in Claude Desktop Extensions Endangers 10k+ Users

1 min read
Source: CybersecurityNews
Zero-Click RCE in Claude Desktop Extensions Endangers 10k+ Users
Photo: CybersecurityNews
TL;DR Summary

Security researchers LayerX revealed a zero-click remote code execution flaw in Claude Desktop Extensions (DXT) that leverages the Model Context Protocol to chain untrusted data from Google Calendar into a privileged local executor. An attacker can trigger the payload via a malicious calendar event with no user interaction, potentially compromising the host with the user’s privileges. The issue affects over 10,000 active Claude users and more than 50 DXT extensions; Anthropic has reportedly not fixed it yet, citing the architecture of MCP autonomy. Mitigations include disconnecting high-privilege local extensions from untrusted data sources and awaiting a patch or architectural changes to MCP. This serves as a warning about the security risks of AI agents autonomously bridging data to local systems.

Share this article

Reading Insights

Total Reads

1

Unique Readers

1

Time Saved

54 min

vs 55 min read

Condensed

99%

10,946120 words

Want the full story? Read the original article

Read on CybersecurityNews