Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
MAI-2024-0009
Published:May 16, 2026
Updated:May 16, 2026
Large Language Models (LLMs) are susceptible to jailbreak attacks facilitated by the innovative Functional Homotopy (FH) optimization technique. This method exploits the functional duality inherent in model training and input generation processes. By iteratively addressing a sequence of optimization problems ranging from simple to complex, FH generates adversarial prompts capable of circumventing built-in safety mechanisms and eliciting unintended model responses. The approach begins by misaligning the model through gradient descent applied to continuous parameters, subsequently utilizing intermediate model states to incrementally construct attacks. This iterative process enhances the success rate of adversarial prompt generation compared to traditional methods. The vulnerability arises from the LLM's inability to resist these systematically crafted prompts, which effectively bypass its designed safety constraints. Mitigation steps: **For AI Developers:** * Develop and deploy advanced safety filtering mechanisms that resist prompt manipulation techniques, including continuous parameter adjustments. * Regularly audit and update safety models to adapt to emerging attack strategies. **For Model Trainers/Fine-tuners:** * Implement robust adversarial training techniques to enhance model resilience against iterative attacks, such as FH. * Investigate and implement alternative optimization methods for prompt generation to reduce susceptibility to exploitation.
Related Resources (1)
Do you need more information?
Contact Us
CVSS v4
Base Score:
9.1
Attack Vector
NETWORK
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
7.4
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE
AIVSS
Base Score:
5.1