Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Reverse Engineering With AI Unearths High-Severity GitHub Bug
    Cybersecurity

    Reverse Engineering With AI Unearths High-Severity GitHub Bug

    adminBy adminApril 29, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Reverse Engineering With AI Unearths High-Severity GitHub Bug
    Share
    Facebook Twitter LinkedIn Pinterest Email

    GitHub yesterday disclosed CVE-2026-3854, a high severity (8.7 CVSS) vulnerability identified in GitHub Enterprise Server that would grant an attacker with push access to a repository to achieve remote code execution. GitHub said in a blog post that the vulnerability also affected github.com, GitHub Enterprise Cloud, GitHub Enterprise Cloud with Data Residency, and GitHub Enterprise Cloud with Enterprise Managed Users. 

    Cloud security firm Wiz reported the vulnerability March 4 through GitHub’s bug bounty program. GitHub said that, in less than two hours, it validated the finding, pushed a fix to github.com, and, after an investigation, concluded no exploitation had taken place. 

    While a remote code execution bug generally is worth calling attention to, the circumstances here are particularly noteworthy, as Wiz explained in its blog post. It’s “one of the first critical vulnerabilities discovered in closed-source binaries using AI, highlighting a shift in how these flaws are identified.”

    Related:Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain

    How CVE-2026-3854 Works

    As GitHub’s Alexis Wales put it in the company’s disclosure blog, user-pushed code in GitHub passes multiple internal services. Metadata, such as repository type and the environment it should be pushed in, is passed between services via an internal protocol. 

    “The vulnerability leveraged how user-supplied git push options were handled within this metadata. Push options are an intentional feature of git that allow clients to send key-value strings to the server during a push,” she wrote. “However, the values provided by the user were incorporated into the internal metadata without sufficient sanitization. Because the internal metadata format used a delimiter character that could also appear in user input, an attacker could inject additional fields that the downstream service would interpret as trusted internal values.”

    Wiz demonstrated that an attacker could chain several of these values together to bypass various protections and internal limitations to execute remote code.

    GitHub and Wiz both advise GitHub Enterprise Server customers to upgrade to a fixed version (3.14.24, 3.15.19, 3.16.15, 3.17.12, 3.18.6 and 3.19.3); contrary to other affected products, Enterprise Server requires an authenticated user with push access to patch. GitHub Enterprise Cloud, GitHub Enterprise Cloud with Enterprise Managed Users, GitHub Enterprise Cloud with Data Residency, and github.com have been patched, and no user intervention is required. 

    In Wiz’s blog post, security researcher Sagi Tzadik urged impacted users to upgrade, noting 88% of instances remained vulnerable at the time of publication.

    Related:Vercel Employee’s AI Tool Access Led to Data Breach

    AI Reverse-Engineered Vulnerability Discovery

    Tzadik wrote that Wiz had previously hunted for vulnerabilities on GitHub Enterprise Server, but “extracting and auditing the sheer volume of compiled blackbox binaries that run this pipeline historically required an impractical amount of time and manual effort.”

    Enter IDA MCP, an AI-powered assistant used for vibe reverse-engineering code. It allowed Wiz to do what was previously “too costly,” the blog explained, such as rapidly analyzing GitHub’s compiled binaries, reconstructing internal protocols, and systematically identifying where user input could influence server behavior. 

    In an email, Tzadik tells Dark Reading that Wiz has been “chasing this target since September 2024,” but couldn’t justify the resources required to do the reverse-engineering work. “It likely would have taken weeks, maybe months, of dedicated time and focus. With the help of AI tools, it took less than 48 hours to go from idea to a working exploit,” he says.

    The closed source element of GitHub is also important, the researcher says, because closed source software historically has been home to the biggest security risks and the most obscurity. “As the latest AI models have improved, it’s become much easier, faster, and cheaper to do things like reverse-engineer closed-source binaries, or produce a working exploit from a CVE identifier and a git commit hash as input,” Tzadik explains. “Scale is also a factor — while researchers used to work on a limited set of projects at a given time, these days it is possible to run automated pipelines on multiple targets at once.”

    Related:North Korea Uses ClickFix to Target macOS Users’ Data

    bug engineering GitHub HighSeverity Reverse Unearths
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow we Grow with Agent-first GTM
    Next Article Earn AI Citations: What Your Content Needs To Look Like [A 4-Article Playbook]
    admin
    • Website

    Related Posts

    Hundreds of Internet-Facing VNC Servers Expose ICS/OT

    April 29, 2026

    SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

    April 29, 2026

    CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog

    April 29, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Hundreds of Internet-Facing VNC Servers Expose ICS/OT

    April 29, 2026

    Earn AI Citations: What Your Content Needs To Look Like [A 4-Article Playbook]

    April 29, 2026

    Reverse Engineering With AI Unearths High-Severity GitHub Bug

    April 29, 2026

    How we Grow with Agent-first GTM

    April 29, 2026
    Categories
    • Blogging (70)
    • Cybersecurity (1,585)
    • Privacy & Online Earning (188)
    • SEO & Digital Marketing (975)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (251)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Hundreds of Internet-Facing VNC Servers Expose ICS/OT

    April 29, 2026

    Earn AI Citations: What Your Content Needs To Look Like [A 4-Article Playbook]

    April 29, 2026

    Reverse Engineering With AI Unearths High-Severity GitHub Bug

    April 29, 2026
    Most Popular
    • Hundreds of Internet-Facing VNC Servers Expose ICS/OT
    • Earn AI Citations: What Your Content Needs To Look Like [A 4-Article Playbook]
    • Reverse Engineering With AI Unearths High-Severity GitHub Bug
    • How we Grow with Agent-first GTM
    • Testing Multi-Path TCP (MPTCP) with iPerf3
    • SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack
    • Can a fake brand win in AI search? New experiment says yes
    • Auvik bets agentic AI can fill the networking skills gap
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.