AI Infrastructure at Risk: MCP Servers Emerge as New Supply Chain Threat

Model Context Protocol (MCP) Servers Identified as a Critical and Emerging AI Supply Chain Risk Vector

HIGH
December 6, 2025
5m read
Supply Chain AttackCloud SecurityVulnerability

Related Entities

Organizations

Products & Tech

Model Context Protocol (MCP)Docker

Other

Smithery.aiFly.io

Full Report

Executive Summary

Security experts are raising alarms about a new and potent threat vector in the AI software supply chain: Model Context Protocol (MCP) servers. A new secure-usage guide from OWASP, highlighted in a report by SC Media, warns that these servers are highly privileged components that bridge AI models with sensitive enterprise data and systems. An incident at MCP hosting provider Smithery.ai illustrates the danger: a path traversal vulnerability was discovered that exposed an administrative token, which could have given an attacker control over 3,000 customer servers. This level of access would allow for mass data exfiltration, code execution, and network sniffing. As organizations increasingly adopt AI, the security of underlying infrastructure like MCP servers is becoming a critical concern.


Threat Overview

Model Context Protocol (MCP) servers are a type of middleware that acts as an automation engine for Large Language Models (LLMs). They fetch and provide context to AI models from various enterprise sources, such as:

  • Code repositories (e.g., GitHub, GitLab)
  • Internal APIs and databases
  • Email and communication platforms (e.g., Microsoft 365, Slack)
  • Document stores (e.g., SharePoint, Confluence)

Because of this function, MCP servers are granted high-trust access and often hold long-lived API keys and credentials. This makes them an extremely valuable target for attackers. A compromise of an MCP server can serve as a powerful pivot point into an organization's most sensitive systems.

The Smithery.ai Incident

The vulnerability at Smithery.ai demonstrates the potential for a catastrophic supply chain attack:

  1. The Flaw: A path traversal vulnerability existed in the platform's Docker build pipeline.
  2. The Exposure: An attacker could exploit this flaw to read arbitrary files on the underlying virtual machine during the build process.
  3. The Prize: The attacker could read a Fly.io authentication token stored on the VM. This single token was overprivileged, granting administrative access to the entire fleet of over 3,000 customer MCP servers hosted on the platform.
  4. The Potential Impact: With this token, an attacker could have executed code, stolen customer data and API keys, and sniffed traffic across thousands of separate customer environments.

While Smithery.ai fixed the flaw, the incident serves as a stark warning about the dangers of centralized, multi-tenant infrastructure with inadequate privilege separation.

Technical Analysis

The emerging threat landscape for MCP servers includes:

  • Platform Vulnerabilities: As seen with Smithery.ai, flaws in the hosting platform or build pipeline can lead to mass compromise.
  • Malicious Open-Source Packages: Another reported incident involved a malicious open-source MCP server package that, when installed, used its legitimate access to exfiltrate emails from the victim organization.
  • Insecure Configurations: Organizations deploying their own MCP servers may misconfigure them, granting excessive permissions or exposing them to the internet without proper authentication.

MITRE ATT&CK TTPs

Impact Assessment

A compromised MCP server is a supply chain attack vector for AI. The potential impact is severe:

  • Mass Data Exfiltration: Theft of source code, customer data, financial records, and employee communications.
  • AI Model Poisoning: An attacker could manipulate the data being fed to AI models, subtly corrupting their outputs and decision-making processes.
  • Rogue Automation: Malicious automation could be triggered, such as deleting production resources or sending fraudulent communications.

Detection & Response

  • Log Monitoring: Monitor the activity of MCP servers. Look for anomalous behavior, such as accessing unusual data sources, exfiltrating large volumes of data, or making API calls at odd hours. This aligns with D3FEND's User Behavior Analysis principles, treating the MCP server as a non-human user.
  • API Key Monitoring: Use cloud security posture management (CSPM) tools to monitor for anomalous usage of API keys associated with MCP servers.

Mitigation

  1. Principle of Least Privilege: When configuring an MCP server, grant it the absolute minimum permissions required to perform its function. It should only have read access if that's all it needs, and access should be scoped to specific repositories or mailboxes. This is a core tenet of User Account Permissions (D3-UAP).
  2. Vet Third-Party Providers: If using a hosted MCP service, conduct thorough security due diligence. Inquire about their multi-tenant architecture, privilege separation, and build pipeline security.
  3. Secure Build Pipelines: For self-hosted deployments, harden your CI/CD and Docker build pipelines. Avoid running build processes with root privileges and use tools to scan for vulnerabilities and misconfigurations. This is a form of Application Configuration Hardening (D3-ACH).
  4. Network Isolation: Isolate MCP servers in their own network segment with strict ingress/egress filtering to limit their ability to communicate with unintended systems.

Timeline of Events

1
December 6, 2025
This article was published

MITRE ATT&CK Mitigations

Strictly enforce the principle of least privilege for MCP servers and their associated service accounts and API keys. They should only have the minimum access necessary.

Mapped D3FEND Techniques:

In multi-tenant environments like Smithery.ai, ensure strong isolation between tenant resources to prevent a compromise in one from affecting others.

Mapped D3FEND Techniques:

Securely configure CI/CD and build pipelines to prevent vulnerabilities like path traversal. Do not use overprivileged tokens within build environments.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The core risk of MCP servers comes from their high-privilege access. To mitigate this, rigorously apply the principle of least privilege to the service accounts and API tokens used by these servers. 1. Scoped-Down Tokens: Instead of using a single, powerful token, generate narrowly scoped access tokens for each specific task. For an MCP server that reads a single code repository, generate a read-only token for that specific repository, not a global read/write token for the entire GitHub organization. 2. Short-Lived Credentials: Avoid long-lived static API keys. Instead, use dynamic, short-lived credentials that expire and rotate automatically (e.g., using AWS IAM Roles, GCP Service Accounts, or HashiCorp Vault). This minimizes the window of opportunity for an attacker if a token is compromised. 3. Regular Audits: Regularly audit the permissions granted to MCP server service accounts. Remove any unused or excessive permissions. This directly counters the issue seen at Smithery.ai, where a single overprivileged token was the key to the kingdom.

Sources & References

MCP servers emerge as new supply chain risk as real attacks accelerate
SC Magazine (scmagazine.com) December 5, 2025
Smithery.ai fixes path traversal flaw that exposed 3,000 MCP servers
SC Magazine (scmagazine.com) December 5, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

MCPAI SecuritySupply Chain AttackDockerPath TraversalSmithery.ai

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading