BotBeat
...
← Back

> ▌

AnthropicAnthropic
RESEARCHAnthropic2026-04-01

Claude AI Used to Discover Critical FreeBSD Kernel RCE Vulnerability (CVE-2026-4747)

Key Takeaways

  • ▸Claude AI successfully identified and developed a functional kernel exploit for CVE-2026-4747, a critical FreeBSD RPCSEC_GSS stack buffer overflow affecting NFS servers
  • ▸The vulnerability stems from missing bounds validation on credential length, allowing attackers to trigger a stack buffer overflow that overwrites return addresses and achieves unauthenticated remote code execution as root
  • ▸The discovery highlights both the security implications of AI-assisted vulnerability research and the importance of rigorous input validation in kernel-level RPC code
Sources:
Hacker Newshttps://github.com/califio/publications/blob/main/MADBugs/CVE-2026-4747/write-up.md↗
Hacker Newshttps://blog.calif.io/p/mad-bugs-claude-wrote-a-full-freebsd↗

Summary

A critical remote code execution vulnerability has been discovered in FreeBSD's RPCSEC_GSS authentication module (kgssapi.ko) that allows unauthenticated attackers to gain root-level access on NFS servers. The vulnerability, CVE-2026-4747, stems from a stack buffer overflow in the svc_rpc_gss_validate() function that fails to validate credential length before copying untrusted data into a 128-byte stack buffer. Notably, the vulnerability was identified and a full working exploit was developed using Claude, Anthropic's large language model, demonstrating the AI's capability in security research and vulnerability analysis.

The flaw affects multiple FreeBSD versions including 13.5, 14.3, 14.4, and 15.0 running NFS servers with RPCSEC_GSS authentication enabled on port 2049/TCP. The overflow allows attackers to overwrite saved registers and the function's return address, enabling arbitrary kernel code execution with root privileges. FreeBSD has released patches for affected versions, with the fix implementing a simple bounds check to prevent oversized credentials from exceeding the buffer's remaining 96 bytes of available space.

  • Patches are available for FreeBSD 14.4-RELEASE-p1 and later versions, implemented through a single bounds-check safeguard

Editorial Opinion

This disclosure raises important questions about the dual-use nature of advanced AI systems in cybersecurity. While Claude's ability to identify and exploit a critical kernel vulnerability demonstrates the sophistication of modern LLMs, it also underscores the urgent need for proactive security auditing in widely-used systems. The vulnerability's simplicity—a missing bounds check—suggests that systematic AI-assisted code review could become a powerful defensive tool, provided the results are responsibly disclosed and patched before weaponization.

Large Language Models (LLMs)AI AgentsDeep LearningCybersecurityAI Safety & Alignment

More from Anthropic

AnthropicAnthropic
POLICY & REGULATION

Advanced AI Models Bring Government to 'Reflection Point,' CIA Official Says

2026-05-20
AnthropicAnthropic
RESEARCH

Anthropic Claude Code Sandbox Bypass: Second Vulnerability Exposes Critical Data Exfiltration Risk

2026-05-20
AnthropicAnthropic
RESEARCH

AI Safety Catastrophically Underfunded: Economic Model Reveals Incentive Gap

2026-05-20

Comments

Suggested

Google / AlphabetGoogle / Alphabet
PRODUCT LAUNCH

Google DeepMind Launches Gemini 3.5 Flash: New Lightweight AI Model

2026-05-20
Executive Office of the President of the United States (Policy/Regulation)Executive Office of the President of the United States (Policy/Regulation)
RESEARCH

SID Achieves Search Breakthrough with SID-1, Outperforming GPT-5 at 1k+ QPS Using Reinforcement Learning

2026-05-20
Helmholtz MunichHelmholtz Munich
RESEARCH

MouseMapper: AI Foundation Model Maps Systemic Damage from Obesity at Whole-Body Scale

2026-05-20
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us