CIO Influence
CIO Influence News Machine Learning Security

Xeris Unveils First-Ever Reasoning-Level LLM Attack Executed via Malicious MCP Server

Xeris Unveils First-Ever Reasoning-Level LLM Attack Executed via Malicious MCP Server

Xeris Logo

Xeris demonstrates how a malicious MCP Server can hijack an LLM’s internal reasoning process, without breaking prompts, permissions, or policy layers.

Xeris Ltd., a leader in enterprise AI security solutions, announced the discovery and demonstration of a groundbreaking vulnerability affecting Large Language Models (LLMs) through a malicious MCP Server. This marks the first time a real-world exploit has shown that an LLM’s reasoning process can be compromised, not just its inputs or outputs.

The attack, named “Step-Controlled Reasoning Exploit,” leverages a specially crafted MCP Server called Ocean_retriever to force the LLM into isolated execution phases. In doing so, it selectively injects manipulated data at just one critical reasoning step, without triggering validation errors or alerts. The result: the LLM generates false, misleading conclusions while appearing fully compliant and trustworthy.

“This attack proves that prompt injection and data leakage are only the beginning. The logic of the LLM itself is now an active threat surface,” said Shlomo Touboul, Co-founder and Chairman of Xeris. “Enterprise AI must prepare for reasoning-level manipulation and enforce controls that span across the full decision chain.”

Also Read: Emerging IT Trends And Technologies Every CIO Should Stay Ahead Of

Reffael Caspi, CEO of Xeris, added:
“We’re entering a new era where reasoning can be weaponized. Xeris is committed to staying ahead of these threats by building real-time defenses that treat MCP Servers like code, not static tools. This discovery is a wake-up call to any organization deploying AI at scale.”

Key Highlights of the Attack
o Isolated step execution enables attackers to preview and selectively override reasoning steps
o Metadata and tabular data remain unaltered, allowing the attack to evade basic integrity checks
o False conclusions are presented in final summaries, impacting downstream decisions
o No traditional prompt or access violations occur, making the attack harder to detect

This report is intended for CISO teams, AI developers, and cybersecurity researchers to better understand and mitigate this emerging class of threats.

Xeris Response and Protections
As part of its MCP-XDR offering, Xeris has deployed new defenses to detect and neutralize step-level reasoning manipulation. Key updates include:

Cross-step validation enforcement

Real-time MCP Server inspection

Policy-based runtime controls

Organizations using AI-powered workflows are advised to assess their exposure to MCP Server logic and implement suitable safeguards.

Also Read: The C-Suite Catalyst: How are CIOs unlocking automation’s true strategic value beyond its efficiencies?

[To share your insights with us as part of editorial or sponsored content, please write to psen@itechseries.com]

Related posts

Ericsson changes Group structure and Executive Team to execute on growth strategy

CT Event Asia to Host 5G TECH 2021

CIO Influence News Desk

AWS Announces AWS Cloud WAN

CIO Influence News Desk