BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
β€’
Β© 2026
β€’
blacktemple.net
  1. Feed
  2. /AI System Discovers 12 Zero-Day Vulnerabilities in OpenSSL, Including Critical RCE

AI System Discovers 12 Zero-Day Vulnerabilities in OpenSSL, Including Critical RCE

February 18, 2026Vulnerabilities & Exploits2 min readcritical

Originally reported by Schneier on Security

#openssl#artificial-intelligence#zero-day#vulnerability-research#critical-severity#automated-discovery
Share

TL;DR

AISLE AI system identified 12 zero-day OpenSSL vulnerabilities, including a critical stack buffer overflow with 9.8 CVSS score. Some bugs existed for over 25 years despite extensive auditing.

Why critical?

Multiple zero-day vulnerabilities in critical infrastructure component OpenSSL, including CVE-2025-15467 with CVSS 9.8 score and confirmed exploit development. OpenSSL's ubiquity makes this extremely high impact.

AI Breakthrough in Vulnerability Discovery

The AISLE AI system has achieved an unprecedented milestone in automated vulnerability research, discovering all 12 zero-day vulnerabilities disclosed in OpenSSL's January 27, 2026 security release. The findings represent a historically unusual concentration of discoveries from a single research team and demonstrate AI's emerging capability to identify complex security flaws that have evaded traditional detection methods.

Critical Findings Include 25-Year-Old Bugs

Among the discoveries, CVE-2025-15467 stands out as particularly severe - a stack buffer overflow in CMS message parsing that enables remote exploitation without valid key material. OpenSSL rated it HIGH severity, while NIST assigned a CVSS v3 score of 9.8 (CRITICAL), an extremely rare severity rating for such established projects.

The research revealed the depth of long-standing vulnerabilities in critical infrastructure:

  • Three vulnerabilities had existed since 1998-2000, persisting for over 25 years
  • One bug predated OpenSSL itself, inherited from Eric Young's original SSLeay implementation
  • All findings occurred in code that had undergone millions of CPU-hours of fuzzing
  • Extensive auditing by teams including Google's had previously missed these flaws

Unprecedented Research Impact

The AI system's track record across recent OpenSSL releases demonstrates consistent discovery capability:

  • 13 of 14 OpenSSL CVEs assigned in 2025
  • 15 total CVEs across the Fall 2025 and January 2026 releases
  • Direct patch contributions accepted for 5 of the 12 latest vulnerabilities
  • 10 vulnerabilities received CVE-2025 identifiers, 2 received CVE-2026 identifiers

Exploitation Reality

Exploits for CVE-2025-15467 have already been developed and made available online, underscoring the immediate threat these discoveries represent. The remote exploitability without authentication makes this particularly concerning for the vast ecosystem of applications and services relying on OpenSSL.

Implications for Cybersecurity

This development signals a fundamental shift in vulnerability research capabilities. As noted by security expert Bruce Schneier, "AI vulnerability finding is changing cybersecurity, faster than expected." The dual-use nature of this technology means both defensive and offensive actors will leverage these capabilities, potentially accelerating both vulnerability discovery and exploitation timelines.

The findings challenge assumptions about code maturity and security assurance, demonstrating that even extensively audited, decades-old codebases can harbor critical vulnerabilities discoverable through advanced AI analysis.

Sources

  • https://www.schneier.com/blog/archives/2026/02/ai-found-twelve-new-vulnerabilities-in-openssl.html

Originally reported by Schneier on Security

Tags

#openssl#artificial-intelligence#zero-day#vulnerability-research#critical-severity#automated-discovery

Tracked Companies

πŸ‡ΊπŸ‡ΈGoogle

Related Intelligence

  • Critical Zero-Day Roundup: Dell RecoverPoint Exploited Since 2024, VoIP Phones Under Attack

    criticalFeb 18, 2026
  • Google Patches Zero-Day CSS Vulnerability in Chrome

    criticalFeb 18, 2026
  • Critical Zero-Days Hit Chrome, Linux AppArmor Flaws Enable Root Escalation, Veeam RCE Vulnerabilities Patched

    criticalMar 13, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Billions of Records Including SSNs Exposed in Massive Database Leak

Next Article

Citizen Lab Exposes Cellebrite Tool Abuse Against Kenyan Activist β†’