Go back

Tracking CVEs Attributed to Anthropic Researchers and Project Glasswing

Patrick Garrity

Patrick Garrity

in/patrickmgarrity/

Anthropic's Project Glasswing has generated significant attention—but very little concrete data. One question keeps coming up: what exactly did it find, disclose, and receive CVEs for? We've fielded this question repeatedly, so I did the work of tracking down publicly disclosed CVEs credited to the Anthropic research team at this time.

Key Takeaways

  • 75 CVEs mention “Anthropic”
  • 40 are actually credited to Anthropic researchers
  • Only 1 is explicitly attributed to Glasswing
  • 10 are from external collaboration programs (Calif.io / MADBugs)

Taken together, this suggests that while Anthropic researchers are actively contributing to vulnerability discovery and appears to be promising, the publicly attributable impact of Glasswing itself remains limited so far.

Methodology

I started by re-reading the Glasswing report and the advisories published at red.anthropic.com. Neither source provides a comprehensive CVE list of vulnerabilities discovered by Anthropic. So I decided to search the full CVE record database, and searched every CVE record containing the term "anthropic" and reviewed each one.

What Disclosed Vulnerabilities Have Been Credited to the Anthropic Research Team?

75 CVE records contain the term "Anthropic." Of those, 40 are credited to Anthropic or Anthropic-affiliated researchers in the credits field. The remaining 35 are CVEs affecting Anthropic tools like Claude Code, MCP Inspector, and third party integrations which are out of scope for this analysis..

Searching the credits field for "Anthropic" is one way to explore this question today, though the credits vary. The 40 break down across three distinct credit attributions: the core Anthropic research team, Nicholas Carlini individually, and Calif.io, an independent security research firm running a program called MADBugs (Month of AI-Discovered Bugs) that credits their work jointly as "Calif.io in collaboration with Claude and Anthropic Research." The 9 wolfSSL CVEs and the NGINX CVE all fall into that third category.

CVE credits are not standardized and depend on how individual CNAs populate the field, meaning attribution is incomplete and sometimes inconsistent.

Here is the breakdown by vendor:

VendorProduct# of CVEs
MozillaFirefox28
wolfSSLwolfSSL9
F5NGINX Plus1
FreeBSDFreeBSD1
OpenSSLOpenSSL1
Total40

The List of 40 CVEs Attributed to Anthropic

CVE NumberDate PublishedVendorProductCVSSCredit
CVE-2026-27632026-02-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27642026-02-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27652026-02-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27662026-02-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27692026-02-24MozillaFirefox8.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27702026-02-24MozillaFirefox8.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27712026-02-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27722026-02-24MozillaFirefox8.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27732026-02-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27742026-02-24MozillaFirefox8.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27752026-02-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27852026-02-24MozillaFirefox8.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27862026-02-24MozillaFirefox8.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27872026-02-24MozillaFirefox8.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27882026-02-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27892026-02-24MozillaFirefox8.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27912026-02-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27962026-02-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27972026-02-24MozillaFirefox8.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-27992026-02-24MozillaFirefox8.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-28042026-02-24MozillaFirefox5.4Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-28052026-02-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-47022026-03-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-47042026-03-24MozillaFirefox7.5Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-47052026-03-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-47182026-03-24MozillaFirefox8.1Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-47232026-03-24MozillaFirefox9.8Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-47242026-03-24MozillaFirefox9.1Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic
CVE-2026-276542026-03-24F5NGINX Plus8.2Calif.io in collaboration with Claude and Anthropic Research
CVE-2026-47472026-03-26FreeBSDFreeBSD8.8Nicholas Carlini using Claude, Anthropic
CVE-2026-283862026-04-07OpenSSLOpenSSL9.1Stanislav Fort (Aisle Research); Pavel Kohout (Aisle Research); Alex Gaynor (Anthropic)
CVE-2026-51942026-04-09wolfSSLwolfSSL9.3Nicholas Carlini from Anthropic
CVE-2026-54462026-04-09wolfSSLwolfSSL6.0Calif.io in collaboration with Claude and Anthropic Research
CVE-2026-55032026-04-09wolfSSLwolfSSL6.9Calif.io in collaboration with Claude and Anthropic Research
CVE-2026-54472026-04-09wolfSSLwolfSSL6.3Calif.io in collaboration with Claude and Anthropic Research
CVE-2026-54662026-04-10wolfSSLwolfSSL7.6Calif.io in collaboration with Claude and Anthropic Research
CVE-2026-54772026-04-10wolfSSLwolfSSL8.2Calif.io in collaboration with Claude and Anthropic Research
CVE-2026-54792026-04-10wolfSSLwolfSSL7.6Calif.io in collaboration with Claude and Anthropic Research
CVE-2026-55002026-04-10wolfSSLwolfSSL8.7Calif.io in collaboration with Claude and Anthropic Research
CVE-2026-55012026-04-10wolfSSLwolfSSL8.6Calif.io in collaboration with Claude and Anthropic Research

What Vulnerabilities Are Directly Attributable to Glasswing?

Despite the attention around Glasswing, only one publicly disclosed CVE can currently be directly tied to it. CVE-2026-4747 (FreeBSD NFS RCE) is explicitly attributed to Glasswing and Mythos Preview by name, described as fully autonomously identified and exploited.

The Glasswing page also references three vulnerabilities without CVE numbers: a 27-year-old OpenBSD flaw, a 16-year-old FFmpeg bug, and Linux kernel privilege escalation chains. All three are still under embargo pending patches.

The broader limitation is that Anthropic committed the details of additional findings via cryptographic hashes prior to public disclosure as they are currently under embargo until a patch is released and the vulnerability is publicly disclosed. The full picture won't be known until public disclosure takes place and Anthropic has indicated a public summary report is expected around July 2026.

The July 2026 report will be the real tell. When Anthropic follows through with a full public accounting of what Glasswing found and fixed, it will provide broader visibility into the details you might be looking for. Until then, the best signals available are the CVE credits field and Anthropic's own advisories at red.anthropic.com.

Considerations for Anthropic

It would be beneficial for Anthropic to create a dedicated security advisory page where security advisories and vulnerability disclosures were published in a consistent way, to provide a way for consumers to understand the question: what vulnerabilities have been discovered by the Anthropic research team and Project Glasswing?

About VulnCheck

VulnCheck is helping organizations not just to solve the vulnerability prioritization challenge - we’re working to help equip any product manager, CSIRT/PSIRT or SecOps team and Threat Hunting team to get faster and more accurate with infinite efficiency using VulnCheck solutions.

We knew that we needed better data, faster across the board, in our industry. So that’s what we deliver to the market. We’re going to continue to deliver key insights on vulnerability management, exploitation and major trends we can extrapolate from our dataset to continuously support practitioners.

Are you interested in learning more? If so, VulnCheck's Exploit & Vulnerability Intelligence has broad threat actor coverage. Register and demo our data today.

Ready to get Started?

Explore VulnCheck, a next-generation Cyber Threat Intelligence platform, which provides exploit and vulnerability intelligence to help you prioritize and remediate vulnerabilities that matter.
  • Vulnerability Prioritization
    Prioritize vulnerabilities that matter based on the threat landscape and defer vulnerabilities that don't.
  • Early Warning System
    Real-time alerting of changes in the vulnerability landscape so that you can take action before the attacks start.