Anatomy of an Autonomous AI Agent Risk: How Qualys ETM Connects the Dots on OpenClaw
Unauthorized OpenClaw AI agent detected on Windows Server; Qualys ETM correlates multiple vulnerability signals into
Summary
An unauthorized OpenClaw autonomous AI agent was discovered disguised as a routine package on a Windows Server host. Qualys Enterprise TruRisk Management (ETM) correlated multiple independent vulnerability signals—including CVE-2026-25253 in clawdbot and CVE-2025-55130 in Node.js components—along with endpoint, exposure, and identity telemetry to escalate the detection from routine to critical priority. The case illustrates how autonomous AI agents introduce operational risks beyond traditional software vulnerabilities, requiring multi-signal correlation and risk context to determine true impact.
Full text
Table of ContentsHow the Investigation BeginsThe First Signal Qualys VMDRA Second, Independent Confirmation: Microsoft Defender Vulnerability ManagementFrom Software Inventory to Active Attack Surface with Qualys EASMWhy Identity Context Changes the Severity?The OpenClaw Lesson: Why Visibility Alone is No Longer EnoughThe Power of Contextual CorrelationFrequently Asked Questions (FAQs)Contributors Executive Summary An unauthorized OpenClaw AI agent was detected disguised as a routine package on a Windows Server host. The situation escalated into a priority incident when Qualys ETM analyzed and correlated four distinct signals. While none of these signals alone warranted urgent action, the combination of endpoint, exposure, and identity telemetry indicated an active risk that needed immediate intervention. Autonomous AI agents are changing how work gets done. By accepting natural-language instructions and executing actions directly on systems, they automate tasks that previously required human involvement. That efficiency is compelling for both users and security teams , but it introduces a new class of operational risk. In an enterprise environment, an unauthorized autonomous agent can establish persistent communication paths, expose local services, execute commands, or operate with the same permissions as the user or system where it is installed. It is not just another application. It shifts the question from “What is this software?” to “What could this software enable?” This is where Qualys Enterprise TruRisk Management (ETM) comes in. ETM enables a Risk Operations Center (ROC) analyst to correlate weak signals across endpoint, exposure, and identity telemetry and determine whether an issue belongs in the backlog or requires immediate action. The OpenClaw investigation that follows illustrates how this correlation plays out. Turn endpoint, exposure, and identity signals into one actionable risk view. Register Today How the Investigation Begins A ROC analyst rarely starts with a clear, high-confidence incident. More often, the first signal is ordinary: a package vulnerability, an unknown application, or a policy exception on a workstation. The challenge is deciding whether that signal belongs in the backlog or deserves immediate attention. That is how OpenClaw first appears in this investigation, as a routine detection on a Windows Server host. The First Signal – Qualys VMDR The Qualys scanner identifies a vulnerability in the clawdbot (OpenClaw) package installed on a Windows Server 2025 Datacenter EC2 instance. The detected version is outdated, prior to the patched release 2026.1.29, and is associated with GHSA-g8p2-7wf7-98mq / CVE-2026-25253. The vulnerability stems from a flaw in the Control UI that trusts the gatewayUrl parameter from the query string without validation. When the UI loads, it initiates a WebSocket connection and transmits a stored gateway token, potentially exposing authentication tokens to unauthorized endpoints. Fig. 1: Qualys VMDR findings for vulnerable clawdbot installed on a Windows Server EC2 instance This detection establishes the presence of a vulnerable package. Qualys ETM builds on this by adding risk context. CVE-2026-25253 carries a CVSS base score of 8.8 and a QVSS of 9.5 (Critical), along with Real-Time Threat Indicators indicating a public exploit and active attacks. Fig. 2: Qualys ETM finding details for CVE-2026-25253, showing CVSS, QVSS, and Real-Time Threat Indicators For a ROC analyst, this still represents an incomplete picture. The presence of a vulnerable package and active exploitation signals is meaningful, but not sufficient to determine risk. The analyst must determine whether the package is in active use, reachable, and what downstream impact it may have. The next step is to correlate this signal with additional telemetry. This first signal from VMDR is still actionable. Teams can begin with a QQL-based inventory sweep to identify all assets where clawdbot or OpenClaw is present, grouping results by TruRisk score and business criticality. From there, VMDR patch management can be used to deploy version 2026.1.29 or later. Tagging impacted assets (for example, openclaw-remediation) and creating a saved search for CVE-2026-25253 helps maintain visibility and detect reintroduction in subsequent scans. This brings the environment to a defensible position: known scope, prioritized remediation, and continuous monitoring. Fig. 3: Qualys ETM findings list for the impacted asset, showing twelve open vulnerabilities tied to the same host A Second, Independent Confirmation: Microsoft Defender Vulnerability Management One signal can be dismissed. Two independent signals are harder to ignore. Microsoft Defender Vulnerability Management, surfaced inside Qualys ETM as a second source, independently flagged a Node.js vulnerability tied to OpenClaw components on the same host. confirms CVE-2025-55130 affecting Node.js 22.12.0 as an active, confirmed local finding, with a patch available and public exploit intelligence. ETM assigns the issue a QVSS base score of 7.2 alongside a CVSS v3 base score of 9.1, helping the analyst assess both severity and real-world risk in context. Fig. 4: Microsoft Defender Vulnerability Management independently detects a Node.js vulnerability on the same host, surfaced inside Qualys ETM For the ROC analyst, this changes the signal. This issue is no longer a single-source artifact. Two independent controls, Qualys VMDR and Microsoft Defender, confirm the presence of vulnerable Node.js components associated with OpenClaw on the same host. This convergence increases confidence and reduces the likelihood of false positives. However, the question is still unresolved. The “vulnerable software exists on disk” is still different from “vulnerable software is actively running and reachable.” The investigation requires one more telemetry layer to make that determination. Fig. 5: Microsoft Defender Vulnerability Management independently detects Node.js vulnerabilities From Software Inventory to Active Attack Surface with Qualys EASM The next question is simple: does this stay local, or does it create reachable exposure? This is where Qualys External Attack Surface Management (EASM) adds critical context. OpenClaw uses port 18792 as its default communication port, and the observed service on that port is node.exe. Fig. 6: Qualys EASM open ports view showing node.exe listening on TCP/18792 on the impacted asset This observation marks the turning point in the investigation. A vulnerable package on disk is one thing. A live runtime service listening on an exposed port is another. It tells the analyst three things at once: the Node.js runtime is active, the OpenClaw software is in use, and the issue has moved from software inventory risk into active attack surface. Port: 18792 Protocol: TCP Detected Service: node.exe Fig. 7: Qualys EASM detection rule — “OpenClaw Service Listening on Port 18789” — built to flag any process opening or listening on the OpenClaw TCP port For the ROC analyst, prioritization shifts immediately. The finding is now a potentially reachable service tied to an autonomous AI tool, one that already has a public exploit and a known token-leak primitive. It is no longer just about unauthorized software on a host. Why Identity Context Changes the Severity? Endpoint findings rarely tell the whole story. Once a suspicious or unauthorized agent is identified, the next question is: what could an attacker do next if they gained leverage through this host? This is where Qualys ETM Identity extends the investigation beyond the endpoint. Two identity weaknesses are especially important in this context. The presence of accounts with SID History tied to non-existing domains. These stale identifiers can create opportunities for abuse through SID-History Injection, enabling impersonation of privileged identities and creating paths to privilege escalation. Fig. 8: Misconfiguration 1 — Detected Acc
Indicators of Compromise
- cve — CVE-2026-25253
- cve — CVE-2025-55130
- malware — OpenClaw