Claude Code Breaks Into FreeBSD in Just Four Hours

A notable new security case is putting a spotlight on how quickly modern vulnerability research is changing in the age of AI. Security researcher Nicholas Carlini says he was able to identify and exploit a FreeBSD vulnerability in roughly four hours with assistance from Anthropic’s AI model Claude—covering the full path from spotting the flaw to producing a working exploit. The issue has been assigned CVE-2026-4747.

That matters because FreeBSD isn’t a niche operating system tucked away in a lab. It’s a widely used foundation across enterprise infrastructure, networking, and consumer technology. Organizations including IBM, Nokia, Juniper Networks, and NetApp use FreeBSD in different parts of their stacks, and parts of Apple’s macOS draw from FreeBSD components. FreeBSD’s footprint also extends into entertainment and consumer devices, with elements used in systems associated with the PlayStation 3, PlayStation 4, and the Nintendo Switch. On the services side, large-scale, network-focused platforms such as Netflix and WhatsApp rely on architecture tied to this ecosystem. In other words, when a FreeBSD security bug appears, the impact can ripple outward far beyond a single OS community.

In this case, the vulnerability sits in the RPCSEC_GSS module, which handles Kerberos authentication for NFS servers. The exploitation method involved a stack buffer overflow—a classic but still dangerous class of bug where more data is written to a stack buffer than it can hold, potentially overwriting nearby memory. Under the right conditions, that can be turned into a reliable path toward unintended behavior and, in worst cases, code execution.

The bigger story isn’t only the technical details of CVE-2026-4747—it’s the timeline. Traditional security response often relies on a patch cycle that can stretch for days or weeks in real-world corporate environments, even after an advisory is released. But this kind of rapid, AI-assisted workflow shows how quickly a vulnerability can move from “unknown” to “working exploit,” shrinking the window defenders have to react.

There are also hints that this pace could accelerate further. Information circulating about a forthcoming Anthropic model reportedly called “Mythos” suggests even faster problem-solving and exploitation capabilities may be coming. Whether or not those expectations hold, the trend is clear: automated assistance is pushing vulnerability discovery and exploit development into an hours-long timeframe, raising the stakes for faster patching, tighter hardening, and more proactive monitoring across systems that depend on foundational platforms like FreeBSD.