BotBeat
...
← Back

> ▌

TheoriTheori
RESEARCHTheori2026-04-30

Theori's AI Platform Discovers Nine-Year-Old Critical Linux Vulnerability in One Hour

Key Takeaways

  • ▸AI-powered Xint Code discovered CVE-2026-31431, a 9-year-old critical Linux kernel vulnerability allowing unprivileged root access in one hour
  • ▸The 732-byte exploit works reliably across all major Linux distributions since 2017, affecting Ubuntu, RHEL, Amazon Linux, SUSE and others
  • ▸The vulnerability exploits a flaw in the kernel's AEAD cryptographic template, combining AF_ALG sockets and splice() to corrupt memory in setuid binaries
Source:
Hacker Newshttps://byteiota.com/copy-fail-cve-2026-31431-732-bytes-to-root-on-all-linux/↗

Summary

Theori's Xint Code, an AI-powered vulnerability research platform, discovered CVE-2026-31431 ("Copy Fail"), a critical Linux kernel flaw affecting every major distribution since 2017. The vulnerability allows any unprivileged user to gain root access using a simple 732-byte Python exploit that modifies setuid binaries in memory. The flaw exploits a logic bug in the kernel's cryptographic template layer, combining AF_ALG sockets, the splice() system call, and the authencesn algorithm to achieve deterministic privilege escalation with 100% reliability across Ubuntu, RHEL, Amazon Linux, SUSE, and other distributions.

Theori's AI-powered platform identified the vulnerability in approximately one hour—a stark contrast to the nine-year window it remained hidden in the world's most heavily reviewed codebase. The vulnerability, if weaponized on the dark market, would typically command over $500,000 as a zero-day exploit. A coordinated disclosure timeline shows the kernel community responding swiftly: the flaw was reported March 23, patches proposed within two days, and merged mainline April 1. CVE-2026-31431 was officially assigned April 22, with public disclosure April 29 after distributions had patched.

The discovery underscores how AI is fundamentally reshaping vulnerability research economics. The exploit's elegant simplicity—a logic bug in the kernel's in-place cryptographic optimization—had eluded human researchers for nearly a decade. Researcher Taeyang Lee highlighted the core issue: the kernel's crypto API assumed all AEAD algorithms would confine writes to intended destinations, but the authencesn algorithm wrote 4 bytes past its output boundary, landing directly in the page cache of target files.

  • AI tools are now capable of finding high-value security flaws (historically worth $500K+) faster than human researchers, reshaping vulnerability research economics

Editorial Opinion

This discovery signals a seismic shift in cybersecurity research. For nearly a decade, human experts missed a half-million-dollar zero-day hiding in plain sight in the Linux kernel's crypto subsystem—yet AI found it faster than a coffee break. This raises uncomfortable questions: if AI can now discover vulnerabilities at machine speed, how will security teams scale detection before attackers do? The economics of vulnerability trading, once favoring patient human researchers, are about to be rewritten by autonomous AI agents capable of scanning entire codebases for exploitation primitives in minutes.

AI AgentsMachine LearningCybersecurityAI Safety & Alignment

Comments

Suggested

xAIxAI
POLICY & REGULATION

Elon Musk Admits xAI Has Used OpenAI's Models in AI Training During Court Testimony

2026-04-30
AnthropicAnthropic
PRODUCT LAUNCH

Claude Security Now Available in Public Beta for Claude Enterprise Customers

2026-04-30
GoodfireGoodfire
PRODUCT LAUNCH

Goodfire Launches Silico: A Mechanistic Interpretability Tool for Debugging and Designing LLMs

2026-04-30
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us