Skip to content

Commit 1d44511

Browse files
authored
Merge pull request #631 from RicoKomenda/feat/c10-mcp-version-downgrade
feat(C10): add MCP protocol version downgrade prevention control (10.3.6)
2 parents 81900e0 + f93838f commit 1d44511

File tree

2 files changed

+2
-0
lines changed

2 files changed

+2
-0
lines changed

1.0/en/0x10-C10-MCP-Security.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,7 @@ Ensure secure discovery, authentication, authorization, transport, and use of MC
4646
| **10.3.6** | **Verify that** SSE-based MCP transport endpoints enforce TLS, authentication, schema validation, payload size limits, and rate limiting. | 2 |
4747
| **10.3.4** | **Verify that** MCP servers validate the `Origin` and `Host` headers on all HTTP-based transports (including SSE and streamable-HTTP) to prevent DNS rebinding attacks and reject requests from untrusted, mismatched, or missing origins. | 2 |
4848
| **10.3.5** | **Verify that** intermediaries do not alter or remove the `Mcp-Protocol-Version` header on streamable-HTTP transports unless explicitly required by the protocol specification, preventing protocol downgrade via header stripping. | 2 |
49+
| **10.3.6** | **Verify that** MCP clients enforce a minimum acceptable protocol version and reject `initialize` responses that propose a version below that minimum, preventing a server or intermediary from forcing use of a protocol version with weaker security properties. | 2 |
4950

5051
---
5152

1.0/en/0x93-Appendix-D_AI_Security_Controls_Inventory.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -99,6 +99,7 @@ Protect data moving between services, agents, tools, and edge devices.
9999
| Authenticated accelerator interconnects (NVLink, PCIe, InfiniBand) | 4.7.7 |
100100
| Encrypted edge-to-cloud communication with bandwidth throttling | 4.8.6 |
101101
| Log encryption in transit | 13.1.3 |
102+
| MCP client minimum protocol version enforcement against downgrade negotiation | 10.3.6 |
102103

103104
**Common pitfalls:** allowing plaintext interconnects in multi-tenant GPU clusters; using SSE over public internet without TLS; not validating certificates on internal service calls.
104105

0 commit comments

Comments
 (0)