GPT-4 can exploit real vulnerabilities by reading advisories (2024)

AI agents, which combine large language models with automation software, can successfully exploit real world security vulnerabilities by reading security advisories, academics have claimed.

In a newly released paper, four University of Illinois Urbana-Champaign (UIUC) computer scientists – Richard Fang, Rohan Bindu, Akul Gupta, and Daniel Kang – report that OpenAI's GPT-4 large language model (LLM) can autonomously exploit vulnerabilities in real-world systems if given a CVE advisory describing the flaw.

"To show this, we collected a dataset of 15 one-day vulnerabilities that include ones categorized as critical severity in the CVE description," the US-based authors explain in their paper.

"When given the CVE description, GPT-4 is capable of exploiting 87 percent of these vulnerabilities compared to 0 percent for every other model we test (GPT-3.5, open-source LLMs) and open-source vulnerability scanners (ZAP and Metasploit)."

If you extrapolate to what future models can do, it seems likely they will be much more capable than what script kiddies can get access to today

The term "one-day vulnerability" refers to vulnerabilities that have been disclosed but not patched. And by CVE description, the team means a CVE-tagged advisory shared by NIST – eg, this one for CVE-2024-28859.

The unsuccessful models tested – GPT-3.5, OpenHermes-2.5-Mistral-7B, Llama-2 Chat (70B), LLaMA-2 Chat (13B), LLaMA-2 Chat (7B), Mixtral-8x7B Instruct, Mistral (7B) Instruct v0.2, Nous Hermes-2 Yi 34B, and OpenChat 3.5 – did not include two leading commercial rivals of GPT-4, Anthropic's Claude 3 and Google's Gemini 1.5 Pro. The UIUC boffins did not have access to those models, though they hope to test them at some point.

The researchers' work builds upon prior findings that LLMs can be used to automate attacks on websites in a sandboxed environment.

GPT-4, said Daniel Kang, assistant professor at UIUC, in an email to The Register, "can actually autonomously carry out the steps to perform certain exploits that open-source vulnerability scanners cannot find (at the time of writing)."

Kang said he expects LLM agents, created by (in this instance) wiring a chatbot model to the ReAct automation framework implemented in LangChain, will make exploitation much easier for everyone. These agents can, we're told, follow links in CVE descriptions for more information.

"Also, if you extrapolate to what GPT-5 and future models can do, it seems likely that they will be much more capable than what script kiddies can get access to today," he said.

  • What's up with AI lately? Let's start with soaring costs, public anger, regulations...
  • GenAI will be bigger than the cloud or the internet, Amazon CEO hopes
  • Arm CEO warns AI's power appetite could devour 25% of US electricity by 2030
  • What if AI produces code not just quickly but also, dunno, securely, DARPA wonders

Denying the LLM agent (GPT-4) access to the relevant CVE description reduced its success rate from 87 percent to just seven percent. However, Kang said he doesn't believe limiting the public availability of security information is a viable way to defend against LLM agents.

"I personally don't think security through obscurity is tenable, which seems to be the prevailing wisdom amongst security researchers," he explained. "I'm hoping my work, and other work, will encourage proactive security measures such as updating packages regularly when security patches come out."

The LLM agent failed to exploit just two of the 15 samples: Iris XSS (CVE-2024-25640) and Hertzbeat RCE (CVE-2023-51653). The former, according to the paper, proved problematic because the Iris web app has an interface that's extremely difficult for the agent to navigate. And the latter features a detailed description in Chinese, which presumably confused the LLM agent operating under an English language prompt.

GPT-4 can exploit real vulnerabilities by reading advisories (1)

How to weaponize LLMs to auto-hijack websites

NOW READ

Eleven of the vulnerabilities tested occurred after GPT-4's training cutoff, meaning the model had not learned any data about them during training. Its success rate for these CVEs was slightly lower at 82 percent, or 9 out of 11.

As to the nature of the bugs, they are all listed in the above paper, and we're told: "Our vulnerabilities span website vulnerabilities, container vulnerabilities, and vulnerable Python packages. Over half are categorized as 'high' or 'critical' severity by the CVE description."

Kang and his colleagues computed the cost to conduct a successful LLM agent attack and came up with a figure of $8.80 per exploit, which they say is about 2.8x less than it would cost to hire a human penetration tester for 30 minutes.

The agent code, according to Kang, consists of just 91 lines of code and 1,056 tokens for the prompt. The researchers were asked by OpenAI, the maker of GPT-4, to not release their prompts to the public, though they say they will provide them upon request.

OpenAI did not immediately respond to a request for comment. ®

GPT-4 can exploit real vulnerabilities by reading advisories (2024)

FAQs

GPT-4 can exploit real vulnerabilities by reading advisories? ›

OpenAI's GPT-4 can exploit real-world security vulnerabilities by reading security advisories (CVE descriptions). It achieved an 87% success rate on a set of 15 vulnerabilities. GPT-4 is significantly more successful than other large language models (LLMs) and open-source vulnerability scanners tested in the research.

In which of the following attacks does the attacker exploit vulnerabilities before the software developer can release a patch for them? ›

A zero-day vulnerability is a software vulnerability discovered by attackers before the vendor has become aware of it.

What is attacking a system by exploiting an otherwise unknown vulnerability? ›

A zero-day attack is an attempt by a threat actor to penetrate, damage, or otherwise compromise a system that is affected by an unknown vulnerability. By nature of the attack, the victim will not have defenses in place, making it highly likely to succeed.

Which of the following attacks exploits a software vulnerability that is unknown to the developer? ›

A zero-day (0day) exploit is a cyber attack targeting a software vulnerability which is unknown to the software vendor or to antivirus vendors.

How do hackers exploit operating system vulnerabilities? ›

Scanning and Enumeration: Hackers use automated tools to scan networks and systems to identify potential vulnerabilities. They look for open ports, services, and devices that might have weak security configurations.

What exploits vulnerabilities or bugs in a system or application? ›

An exploit is a program, or piece of code, designed to find and take advantage of a security flaw or vulnerability in an application or computer system, typically for malicious purposes such as installing malware. An exploit is not malware itself, but rather it is a method used by cybercriminals to deliver malware.

How exploits relate to vulnerabilities? ›

Exploits are the means through which a vulnerability can be leveraged for malicious activity by hackers; these include pieces of software, sequences of commands, or even open-source exploit kits.

What are some common ways an attacker could exploit the system? ›

Common Attack Vector Examples
  • Compromised Credentials. ‍Usernames and passwords are still the most common type of access credential and continue to be exposed in data leaks, phishing scams, and malware. ...
  • Weak Credentials. ...
  • Insider Threats. ...
  • Missing or Poor Encryption. ...
  • Misconfiguration. ...
  • Ransomware. ...
  • Phishing. ...
  • Vulnerabilities.
Jan 18, 2024

Which type of exploit requires accessing to any vulnerable system? ›

Remote exploits: Works over a network and exploits the vulnerability without prior access to the vulnerable system. Local exploits: Requires prior access to the vulnerable system and increases the privilege of the attacker past those granted by the security administrator.

What is an example of vulnerability exploitation? ›

A cybercriminal exploiting a vulnerability can perform various malicious actions, such as installing malicious software (malware), running malicious code, and stealing sensitive data. Common exploitation techniques include SQL injection (SQLi), cross-site scripting (XSS), and buffer overflow.

What is the best defense against social engineering? ›

Top 10 Ways to Prevent Social Engineering Attacks
  1. Multi-Factor Authentication. ...
  2. Continuously Monitor Critical System. ...
  3. Utilize Next-Gen cloud-based WAF. ...
  4. Verify Email Sender's Identity. ...
  5. Identify your critical assets which attract criminals. ...
  6. Check for SSL Certificate. ...
  7. Penetration Testing. ...
  8. Check and Update your Security Patches.
Jan 2, 2024

What is a dummy computer that is made to look vulnerable in order to deceive attackers? ›

A honeypot is a security mechanism that creates a virtual trap to lure attackers. An intentionally compromised computer system allows attackers to exploit vulnerabilities so you can study them to improve your security policies.

What is the most famous zero day exploit? ›

Attack #1 – Sony Zero-Day Attack

One of the most famous zero-day attacks was launched in 2014 against Sony Pictures Entertainment. Through a specific unknown exploit, a team of hackers silently crept into Sony's network and got access to all vital information quickly.

Which vulnerability is most frequently exploited by hackers? ›

The most common security vulnerabilities that are exploited by hackers are: Injection flaws: These vulnerabilities allow attackers to inject malicious code into a system, such as through a web application or database.

How do hackers find their victims? ›

An attacker might choose their target list through readily available data online, such as employee count, industry, or existing vendor relationships, then narrow their search down further from there.

How do hackers penetrate networks? ›

One of the fastest ways cybercriminals access networks is by duping unsuspecting users to willfully download malicious software by embedding it within downloadable files, games or other “innocent”-looking apps. This can largely be prevented with a good firewall and employee training and monitoring.

In which of the following attacks does an attacker exploit the vulnerability in a bare metal cloud server? ›

The correct answer to the question is B. Cloudborne attack. In a Cloudborne attack, an attacker exploits the vulnerability in a bare-metal cloud server to implant a malicious backdoor in its firmware. A bare-metal cloud server is a physical server that is dedicated to a single user or organization.

What can an attacker do with a software vulnerability? ›

What Can an Attacker Do With a Software Vulnerability? An attacker can exploit a software vulnerability to steal or manipulate sensitive data, join a system to a botnet, install a backdoor, or plant other types of malware.

In which phase the hacker exploits the network or system vulnerabilities? ›

Explanation: Penetration testers after scanning the system or network tries to exploit the flaw of the system or network in “gaining access” phase.

What are the three types of software attacks? ›

The 3 Main Types of Cyberattacks & How to Prevent Them
  • Malware. An attack that involves the installation of unwanted programs or software on your system without your permission.
  • Social Engineering. ...
  • DoS and DDoS Attacks. ...
  • Man-In-The-Middle Attacks. ...
  • SQL Injections. ...
  • Cybersecurity Breaches. ...
  • Tips on Preventing Cyberattacks.
Jul 20, 2020

References

Top Articles
Latest Posts
Article information

Author: Terrell Hackett

Last Updated:

Views: 6385

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Terrell Hackett

Birthday: 1992-03-17

Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

Phone: +21811810803470

Job: Chief Representative

Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.