To be among the top seven finalists for the AIxCC Semifinal Competition (ASC), teams must have found more than one vulnerability across more than one class* of vulnerability. Out of five challenge projects (Linux Kernel, Jenkins, Nginx, SQLite3, and Apache Tika), competitors’ systems discovered 22 unique synthetic vulnerabilities in the Challenge Projects, and of those, patched 15. Competitors’ systems identified 11 unique patches for C-based challenges and four unique patches for Java-based challenges. For more information on the solve status of the ASC, you may visit the Collective Health Solve dashboard: https://dashboard.aicyberchallenge.com/collectivesolvehealth.
*Each of the ASC challenge project vulnerabilities is associated with one or more vulnerability class based on MITRE’s Common Weakness Enumeration (CWE) list. This industry standard categorizes known software and hardware weaknesses and vulnerabilities, assigning each CWE a Weakness ID, referenced in the chart below. The seven finalists found and/or patched CPVs in vulnerability classes that are listed among the “CWE Top 25 Most Dangerous Software Weaknesses.” For more information, please visit the MITRE CWE website: .
C | Java | |||||||
---|---|---|---|---|---|---|---|---|
Team Name (Alphabetical) | Out-of-Bounds Read/Write (CWE-125 / CWE-787) | Integer Overflow (CWE-190) | Use After Free (CWE-416) | NULL Pointer Dereference (CWE-476) | Path Traversal (CWE-22) | Command Injection (CWE-77, CWE-78) | Deserialization (CWE-502) | Server-Side Request Forgery (SSRF) (CWE-918) |
42-b3yond-6ug | ||||||||
all_you_need_is_a_fuzzing_brain | ||||||||
Lacrosse | ||||||||
Shellphish | ||||||||
Team Atlanta | ||||||||
Theori | ||||||||
Trail of Bits |
C | ||||
---|---|---|---|---|
Team Name | Out-of-Bounds Read/Write | Integer Overflow | Use After Free | NULL Pointer Dereference |
(Alphabetical) | (125 / 787) | -190 | -416 | -476 |
42-b3yond-6ug | ||||
all_you_need_is_a_fuzzing_brain | ||||
Lacrosse | ||||
Shellphish | ||||
Team Atlanta | ||||
Theori | ||||
Trail of Bits |
Not Found Found Patched
Java | ||||
---|---|---|---|---|
Team Name | Path Traversal | Command Injection | Deserialization | Server-Side Request Forgery (SSRF) |
(Alphabetical) | -22 | (77, 78) | -502.0 | -918 |
42-b3yond-6ug | ||||
all_you_need_is_a_fuzzing_brain | ||||
Lacrosse | ||||
Shellphish | ||||
Team Atlanta | ||||
Theori | ||||
Trail of Bits |