Claudio Criscione

5.1K posts

Claudio Criscione banner
Claudio Criscione

Claudio Criscione

@paradoxengine

Security Robot Overlord @ Google. Vulnerability Management @paradoxengine.criscio.net @[email protected]

Italy Katılım Nisan 2008
377 Takip Edilen2.7K Takipçiler
Jasvir Nagra ✨
Jasvir Nagra ✨@jasvir·
Funny seeing insights rediscovered. The second most interesting insight I had building at Google (this with the awesome @paradoxengine) was if your fuzzer finds far fewer bugs but with executable, replayable test cases - more bugs got fixed. AI will get there too. Eventually.
Jasvir Nagra ✨ tweet media
English
1
1
3
213
Claudio Criscione retweetledi
Brian in Pittsburgh
Brian in Pittsburgh@arekfurt·
This is just... I barely even know what to say. This has to be one of the absolute worst (meaning: most incredibly ridiculous) vulnerabilities in a major vendor product in the last decade. Cisco's devs literally just forgot to invoke the authentication check.
Brian in Pittsburgh tweet mediaBrian in Pittsburgh tweet media
Stephen Fewer@stephenfewer

Today @rapid7 and Cisco are disclosing CVE-2026-20182, a critical (CVSS 10.0) auth bypass affecting Cisco Catalyst SD-WAN Controller, found by @_CryptoCat and I when we were researching CVE-2026-20127 last Feb. An unauth attacker can become the vmanage-admin and issue arbitrary NETCONF commands. Cisco has also disclosed that the new CVE is already EITW as of this month. Read our blog here with full technical details: rapid7.com/blog/post/ve-c…

English
8
51
251
30.8K
Claudio Criscione retweetledi
scriptjunkie (Matt)
scriptjunkie (Matt)@scriptjunkie1·
I appreciate everyone dropping linux privesc 0days in the current AI renaissance, but to really make it feel like the good ol days someone needs to drop a weaponized pre-auth SMB or RDP RCE. We haven't had a good Windows worm in AGES.
English
11
42
269
21.7K
Claudio Criscione retweetledi
Federico Kirschbaum
Federico Kirschbaum@fede_k·
In our first week we wrote about a RCE @XBOW found in Exim. What thought would be a deep technical write-up, became something more personal. 1/🧵
English
2
14
56
16.7K
Claudio Criscione
Claudio Criscione@paradoxengine·
@GuifreRuiz Yeah, I intuitively understand that and have seen tentative examples. I've also seen good outcomes on scanning runtimes. Code-level analysis though, not so much.
English
0
0
0
27
Guifre
Guifre@GuifreRuiz·
@paradoxengine imho Mythos and newer models are getting very good at finding interesting business logic issues. Doing intra/inter-file analysis and reasoning about workflows in a way we didn’t have automated technology for before.
English
1
0
0
40
Claudio Criscione
Claudio Criscione@paradoxengine·
All the AI vulns I've seen so far - the confirmed ones, not the ones where you cheat to get an exploit - were egreppable. I've not seen many yet and maybe a library of greps Is fine. We'll see. OTOH agentic attackers are very real.
English
1
0
4
225
Claudio Criscione retweetledi
thaidn
thaidn@XorNinja·
Except that this httpd pre-auth “RCE” exploit does not work. A real exploit requires an infoleak, and the author conveniently supplied a “helper” that reads addresses directly from /proc//mem. We also found this bug in early April, submitted it, and were told it's a dup. Then we burned to develop an exploit, to no avail. Need an infoleak. It's interesting that AI struggles exactly where humans struggle too.
striga@striga_ai

PoCs for Apache Tomcat Unauth RCE (CVE-2026-34486) and Apache httpd Pre-auth RCE (CVE-2026-23918) are now public on our Github. Tomcat exploit is fully reliable. httpd chain works in a controlled lab setup with a known info leak. github.com/striga-ai/CVE-… github.com/striga-ai/CVE-…

English
7
35
239
40.2K
Claudio Criscione retweetledi
NEOMECHANICA
NEOMECHANICA@neomechanica·
GIF
ZXX
1
22
152
6.2K
Claudio Criscione
Claudio Criscione@paradoxengine·
Human in the loop has strong "don't click on untrusted links" vibes..
English
3
9
31
9.1K
Claudio Criscione retweetledi
Francisco Falcon
Francisco Falcon@fdfalcon·
A rogue DHCP server can inject arbitrary dhclient.conf directives via malicious DHCP options and get RCE as root in systems running dhclient: freebsd.org/security/advis…
English
2
25
84
11.3K
Shane Huntley
Shane Huntley@ShaneHuntley·
@halvarflake Prediction: We will reach AGI well before LLMs are successful at the types of problems that @halvarflake finds intellectually interesting. This is no way reduces my optimism around AI capabilities.
English
2
0
3
335
Claudio Criscione retweetledi
Nico Waisman
Nico Waisman@nicowaisman·
That’s true, but not every company can realistically afford security by default. The real shift is that, before Mythos and similar players, the assumption was that, economically, these exploits would only be used against high-value targets. That assumption has now fundamentally changed.
English
5
11
28
12.3K
Claudio Criscione retweetledi
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
CISO goes to doctor. Says he's depressed. Says cybersecurity is harsh and cruel. Says he fears Mythos and needs to patch all vulnerabilities in the CISA KEV catalog immediately. Doctor says, 'Treatment is simple. Great CISO Pagliacci is in town tonight. Go and see him, he can help patch all vulnerabilities in the CISA KEV catalog immediately.' Man bursts into tears. Says, 'But doctor...
English
14
19
261
24K
Claudio Criscione retweetledi
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
I pointed claude opus at chrome and told it to build a full v8 exploit for discord. A week of back-and-forth pulling it out of dead ends. 2.3B tokens. $2,283 in API costs, and it popped a shell. hacktron.ai/blog/i-let-cla…
English
22
172
1.1K
154.5K
Claudio Criscione retweetledi
Max Karpis
Max Karpis@maxkarpis·
Revolut is launching GlobalHire in the UK today. It's Revolut's Employer of Record (EOR) service. The product lets companies hire talent in 160+ countries from within Revolut without needing to set up local entities. All the complexity – local cross-border payroll, benefits, HR, tax, and local compliance – is handled, so customers can focus on what really matters: growing their businesses. This is huge - the employment is the largest marketplace on earth, and Revolut decided to transform it.
Max Karpis tweet media
English
60
106
1.7K
274K
Claudio Criscione
Claudio Criscione@paradoxengine·
@securityweekly We got a pretty significant investment in Tsunami in default and bruteforceable testing over network scanning. Not great, but very useful. Other stuff too, but this one is open sourced :)
English
0
0
1
76
Claudio Criscione retweetledi
Dino A. Dai Zovi
Dino A. Dai Zovi@dinodaizovi·
@moyix Being able to just pop out exploits for EOL and specialized software will definitely have its operational uses...
English
1
5
33
4.3K