AI-Driven Exploit Generation Reduces Time to Proof-of-Concept to 15 Minutes
Summary
Hide â˛
Show âŧ
A new AI-powered system, Auto Exploit, developed by Israeli researchers, generates proof-of-concept exploits for vulnerabilities in open-source software in under 15 minutes. The system uses large language models (LLMs) to analyze CVE advisories and patches, creating exploits for 14 vulnerabilities. This development highlights the potential for rapid, automated exploit creation, significantly reducing the time defenders have to respond to new vulnerabilities. The system leverages Anthropic's Claude-sonnet-4.0 model to analyze advisories and code patches, generating exploit code and validating it against vulnerable and patched applications. The researchers emphasize that this capability could be used by both financially motivated attackers and nation-state actors, increasing the risk of N-day exploits. The ease of bypassing LLM guardrails and the low cost of generating exploits underscore the need for defenders to adapt to faster exploitation cycles and focus on reachability analysis to prioritize vulnerability remediation.
Timeline
-
29.08.2025 16:01 đ° 1 articles
AI-Powered Exploit Generation System Developed
An AI-powered system, Auto Exploit, has been developed by Israeli researchers to generate proof-of-concept exploits for vulnerabilities in open-source software in under 15 minutes. The system uses LLMs to analyze CVE advisories and patches, creating exploits for 14 vulnerabilities. This development highlights the potential for rapid, automated exploit creation, significantly reducing the time defenders have to respond to new vulnerabilities.
Show sources
- Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation â www.darkreading.com â 29.08.2025 16:01
Information Snippets
-
Auto Exploit system generates proof-of-concept exploits in under 15 minutes using LLMs.
First reported: 29.08.2025 16:01đ° 1 source, 1 articleShow sources
- Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation â www.darkreading.com â 29.08.2025 16:01
-
The system analyzes CVE advisories and patches to create exploit code.
First reported: 29.08.2025 16:01đ° 1 source, 1 articleShow sources
- Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation â www.darkreading.com â 29.08.2025 16:01
-
Auto Exploit was developed by Israeli researchers Nahman Khayet and Efi Weiss.
First reported: 29.08.2025 16:01đ° 1 source, 1 articleShow sources
- Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation â www.darkreading.com â 29.08.2025 16:01
-
The system created exploits for 14 vulnerabilities in open-source software.
First reported: 29.08.2025 16:01đ° 1 source, 1 articleShow sources
- Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation â www.darkreading.com â 29.08.2025 16:01
-
LLMs like Claude-sonnet-4.0 and ChatGPT can be used to bypass guardrails for exploit generation.
First reported: 29.08.2025 16:01đ° 1 source, 1 articleShow sources
- Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation â www.darkreading.com â 29.08.2025 16:01
-
The median time-to-exploitation of a vulnerability in 2024 was 192 days.
First reported: 29.08.2025 16:01đ° 1 source, 1 articleShow sources
- Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation â www.darkreading.com â 29.08.2025 16:01
-
The cost of generating exploits using Auto Exploit is approximately $1 per exploit.
First reported: 29.08.2025 16:01đ° 1 source, 1 articleShow sources
- Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation â www.darkreading.com â 29.08.2025 16:01
-
Defenders need to focus on reachability analysis to prioritize vulnerability remediation.
First reported: 29.08.2025 16:01đ° 1 source, 1 articleShow sources
- Proof-of-Concept in 15 Minutes? AI Turbocharges Exploitation â www.darkreading.com â 29.08.2025 16:01
Similar Happenings
Cursor AI editor autoruns malicious code in repositories
A flaw in the Cursor AI editor allows malicious code in repositories to autorun on developer devices. This vulnerability can lead to malware execution, environment hijacking, and credential theft. The issue arises from Cursor disabling the Workspace Trust feature from VS Code, which prevents automatic task execution without explicit user consent. The flaw affects one million users who generate over a billion lines of code daily. The Cursor team has decided not to fix the issue, citing the need to maintain AI and other features. They recommend users enable Workspace Trust manually or use basic text editors for unknown projects. The flaw is part of a broader trend of prompt injections and jailbreaks affecting AI-powered coding tools.
Active exploitation of SAP S/4HANA command injection vulnerability CVE-2025-42957
A critical command injection vulnerability in SAP S/4HANA, tracked as CVE-2025-42957, is being actively exploited in the wild. The flaw allows attackers with low-privileged user access to execute arbitrary ABAP code, potentially leading to full system compromise. The vulnerability affects both on-premise and private cloud editions of SAP S/4HANA. The exploit can result in unauthorized modification of the SAP database, creation of superuser accounts, and theft of password hashes. Organizations are advised to apply patches immediately and monitor for suspicious activity. The vulnerability was fixed by the vendor on August 11, 2025, but several systems have not applied the available security updates, and these are now being targeted by hackers who have weaponized the bug. SecurityBridge discovered the vulnerability and reported it to SAP on June 27, 2025, and even assisted in the development of a patch. SecurityBridge and Pathlock have confirmed active exploitation of the vulnerability. The patch for CVE-2025-42957 is relatively easy to reverse engineer, and successful exploitation gives attackers access to the operating system and all data in the targeted SAP system. Organizations are urged to implement additional security measures, such as SAP's Unified Connectivity framework (UCON), to restrict RFC usage and monitor logs for suspicious activity.
Active exploitation of TP-Link TL-WA855RE Wi-Fi range extender vulnerability
The US Cybersecurity and Infrastructure Security Agency (CISA) has warned of active exploitation of a missing authentication vulnerability in TP-Link TL-WA855RE Wi-Fi range extender products. The flaw, tracked as CVE-2020-24363, allows attackers on the same network to send unauthenticated requests for a factory reset and reboot, potentially gaining administrative access. The vulnerability was disclosed in August 2020 and has been resolved by TP-Link in firmware updates. However, the product is now discontinued, and users are advised to discontinue its use. CISA has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, urging federal agencies to address it by September 23, 2025. On September 4, 2025, CISA added two additional TP-Link router vulnerabilities, CVE-2023-50224 and CVE-2025-9377, to its KEV catalog, noting evidence of active exploitation. These vulnerabilities affect multiple TP-Link router models, some of which have reached end-of-life status. TP-Link released firmware updates in November 2024 to address these issues, but recommends upgrading to newer hardware for enhanced protection.
HexStrike AI Exploits Citrix Vulnerabilities Disclosed in August 2025
Threat actors have begun using HexStrike AI to exploit Citrix vulnerabilities disclosed in August 2025. HexStrike AI, an AI-driven security platform, was designed to automate reconnaissance and vulnerability discovery for authorized red teaming operations, but it has been repurposed for malicious activities. The exploitation attempts target three Citrix vulnerabilities, with some threat actors offering access to vulnerable NetScaler instances for sale on darknet forums. The use of HexStrike AI by threat actors significantly reduces the time between vulnerability disclosure and exploitation, increasing the risk of widespread attacks. The tool's automation capabilities allow for continuous exploitation attempts, enhancing the likelihood of successful breaches. Security experts emphasize the urgency of patching and hardening affected systems to mitigate the risks posed by this AI-driven threat. HexStrike AI's client features a retry logic and recovery handling to mitigate the effects of failures in any individual step on its complex operations. HexStrike AI has been open-source and available on GitHub for the last month, where it has already garnered 1,800 stars and over 400 forks. Hackers started discussing HexStrike AI on hacking forums within hours of the Citrix vulnerabilities disclosure. HexStrike AI has been used to automate the exploitation chain, including scanning for vulnerable instances, crafting exploits, delivering payloads, and maintaining persistence. Check Point recommends defenders focus on early warning through threat intelligence, AI-driven defenses, and adaptive detection.
Exploit chain in Sitecore Experience Platform enables remote code execution
Three new vulnerabilities in the Sitecore Experience Platform can be chained to achieve remote code execution (RCE). The flaws include HTML cache poisoning, RCE through insecure deserialization, and information disclosure via the ItemService API. Patches for these vulnerabilities were released in June and July 2025. The exploit chain leverages a combination of pre-authentication and post-authentication vulnerabilities to compromise fully-patched instances of the platform. Additionally, a zero-day vulnerability (CVE-2025-53690) has been exploited by threat actors to deliver malware, including WeepSteel, and perform extensive reconnaissance and lateral movement. The flaw is a ViewState deserialization vulnerability caused by the inclusion of a sample ASP.NET machine key in pre-2025 Sitecore guides. The attackers target the '/sitecore/blocked.aspx' endpoint, which contains an unauthenticated ViewState field, and achieve RCE under the IIS NETWORK SERVICE account by leveraging CVE-2025-53690. The malicious payload dropped by the attackers is WeepSteel, a reconnaissance backdoor that gathers system, process, disk, and network information. The attack observed by Mandiant stemmed from a documentation issue involving sample machine keys provided for customer use. Sitecore advised customers to rotate and secure ASP.NET machine keys, encrypt