ResearchCritical

AI-Driven Discovery Uncovers 12 Critical OpenSSL Zero-Days in Historic Find

3 min readSource: Schneier on Security
CVE-2025-15467

AISLE's AI system identified 12 zero-day vulnerabilities in OpenSSL, including a 9.8 CVSS-rated flaw, reshaping cybersecurity research methodologies.

AI System Discovers 12 Zero-Day Vulnerabilities in OpenSSL

An AI-driven security research system developed by AISLE has identified 12 previously unknown zero-day vulnerabilities in OpenSSL, disclosed in the project's January 27, 2026 security release. The findings mark a historic milestone in automated vulnerability research, with the AI system credited for 13 of 14 OpenSSL CVEs assigned in 2025 and 15 total across two recent releases—an unprecedented concentration for any research team, let alone an AI-driven one.

Technical Details of the Vulnerabilities

The discovered flaws include CVE-2025-15467, a stack buffer overflow in CMS message parsing rated HIGH severity by OpenSSL and CRITICAL (9.8 CVSS) by NIST. This vulnerability is remotely exploitable without valid key material, and exploit code has already surfaced online. Notably:

  • Three vulnerabilities dated back to 1998–2000, evading detection for over 25 years despite extensive fuzzing and audits.
  • One flaw originated from SSLeay, the precursor to OpenSSL, predating the project itself.
  • Five of the twelve vulnerabilities included AI-generated patches that were accepted into the official OpenSSL release.

The OpenSSL codebase, subjected to millions of CPU-hours of fuzzing and audits by teams including Google’s, had long been considered a benchmark for secure software development. These findings challenge assumptions about the efficacy of traditional vulnerability discovery methods.

Impact and Implications

The discovery underscores the transformative potential of AI in cybersecurity research, demonstrating its ability to uncover deep, historical flaws that evaded human and machine analysis for decades. However, the dual-use nature of AI-driven vulnerability discovery raises critical questions:

  • Offensive applications: Threat actors could leverage similar AI systems to identify and exploit zero-days at scale.
  • Defensive advancements: AI-driven tools may accelerate vulnerability patching and reduce exposure windows for critical software.
  • Research paradigm shift: The concentration of discoveries by a single AI system suggests a new era of automated security research, where AI augments (or potentially surpasses) human-driven efforts.

Recommendations for Security Teams

  1. Prioritize patching: Organizations using OpenSSL should immediately apply the January 27, 2026 security update, particularly for CVE-2025-15467 and other high-severity flaws.
  2. Monitor exploit development: Given the public availability of exploit code for CVE-2025-15467, security teams should enhance monitoring for related attack patterns.
  3. Assess AI-driven tools: Evaluate the integration of AI-based vulnerability discovery tools into internal security research and red-team workflows.
  4. Review legacy code: The discovery of 25-year-old vulnerabilities highlights the need for retrospective audits of foundational codebases, even those considered well-audited.

The AISLE team’s findings signal a watershed moment in cybersecurity, where AI is no longer a supplementary tool but a primary driver of vulnerability discovery. As AI capabilities advance, both defenders and attackers will increasingly rely on these systems, reshaping the threat landscape in real time.

Share