Skip to content
Longterm Wiki
Back

AI systems can generate working exploits for published CVEs in just 10-15 minutes

web

Relevant to AI safety discussions around dual-use capabilities and deployment risks; illustrates how frontier AI coding abilities can rapidly translate into real-world offensive cyber threats, informing debates on capability disclosure and model deployment safeguards.

Metadata

Importance: 62/100news articlenews

Summary

Research demonstrates that AI systems, particularly large language models, can autonomously generate functional exploit code for known CVE vulnerabilities in as little as 10-15 minutes. This capability significantly lowers the barrier for cyberattacks by enabling even low-skilled actors to rapidly weaponize disclosed vulnerabilities. The findings raise urgent concerns about the accelerating timeline between vulnerability disclosure and active exploitation.

Key Points

  • LLMs can produce working exploit code for published CVEs in 10-15 minutes, dramatically compressing the vulnerability-to-exploit timeline.
  • This capability democratizes cyberattack execution, enabling less skilled threat actors to leverage sophisticated exploits with minimal effort.
  • The speed of AI-assisted exploitation outpaces traditional patch deployment cycles, increasing the window of risk for unpatched systems.
  • Findings highlight a dual-use risk inherent in capable AI coding systems when applied to publicly available vulnerability disclosures.
  • Critical infrastructure and widely-used software face heightened risk as AI lowers the cost and expertise required for targeted attacks.

Cited by 1 page

PageTypeQuality
Cyberweapons RiskRisk91.0

Cached Content Preview

HTTP 200Fetched Mar 20, 20262 KB
[gbhackers.](https://gbhackers.com/)

Thursday, March 19, 2026

[Linkedin](https://www.linkedin.com/company/cyber-threat-intel/ "Linkedin")

[RSS](https://gbhackers.com/feed/ "RSS")

[Twitter](https://x.com/gbhackers_news "Twitter")

[gbhackers.](https://gbhackers.com/)

- [Home](https://gbhackers.com/)
- [Threats](https://gbhackers.com/category/threatsattacks/)
- [Cyber Attack](https://gbhackers.com/category/cyber-attack/)
- [Data Breach](https://gbhackers.com/category/data-breach/)
- [Vulnerability](https://gbhackers.com/category/vulnerability-android-2/)
- [What is](https://gbhackers.com/category/what-is/)
- [DFIR](https://gbhackers.com/category/incident-response/)
- [Top 10](https://gbhackers.com/category/top-10/)

Search

[Search](https://gbhackers.com/ai-generating-cves-in-just-10-15-minutes/#)

[Follow us On Linkedin](https://www.linkedin.com/company/cybersecurity-news/ "Follow us On Linkedin")

![AI Systems Capable of Generating Working Exploits for CVEs in Just 10–15 Minutes](https://i2.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk7Sj3Na_7hsKmB1FqMARbMli4rIai_YR3UgR7I_PWJ15h3b9E3eNDWAYYwI6V1LVSiBfbIEUEwuSP2PVE8eL6iBgT6DvsJYqsL08qYBlOSA8MkdQkbVa9L72GMS_TEYNNOQpzgfNhXZmxDEJMBP1RZtF1yJZ1GqaQq5U0l1S58Z9eT58btNLr82oyb_3Z/s1600/New%20Microsoft%20365%20Admin%20Feature%20%20%288%29%20%281%29.webp?w=1920&resize=1920,0&ssl=1)

[CVE/vulnerability](https://gbhackers.com/category/cvevulnerability/) [Cyber Security News](https://gbhackers.com/category/cyber-security-news/) [Vulnerability](https://gbhackers.com/category/vulnerability-android-2/)

2 min.Read

# AI Systems Capable of Generating Working Exploits for CVEs in Just 10–15 Minutes

[![Divya](https://secure.gravatar.com/avatar/030ce841d650bd7608e500f5df725da8758a0fd9fe0397842fb061f63cbf20a2?s=96&d=mm&r=g)](https://gbhackers.com/author/divya/ "Divya")

By [Divya](https://gbhackers.com/author/divya/)

August 22, 2025
Resource ID: a75226ca2cfc4b0f | Stable ID: MzhjOTVlZj