Vulnerabilities

AI-Powered Vulnerability Detection

May 14, 2026 08:04 · 12 min read
AI-Powered Vulnerability Detection

Introduction to AI-Powered Vulnerability Detection

Microsoft and Palo Alto Networks have separately reported significant results after using AI to detect vulnerabilities in their own code. Advanced AI models have sparked debate in the cybersecurity industry about the future of vulnerability discovery.

Microsoft's Autonomous Code Security team built a new AI system called MDASH (multi-model agentic scanning harness), which found more than a dozen vulnerabilities fixed with its latest Patch Tuesday updates. Palo Alto Networks used Claude Mythos and other AI models to conduct a deep scan of its product portfolio, resulting in the discovery of dozens of vulnerabilities.

Microsoft's MDASH System

MDASH orchestrates over 100 specialized AI agents across multiple frontier and distilled AI models to find vulnerabilities in Microsoft's codebases. The system runs a structured pipeline that moves findings through several distinct stages: preparation, scanning, validation, deduplication, and proof construction.

According to Microsoft, MDASH was used to discover 16 vulnerabilities fixed with the latest Patch Tuesday updates, including four critical ones. The AI system also achieved an 88% rating on the public CyberGym benchmark and recovered 96% and 100% of confirmed vulnerabilities found over the past five years in two heavily audited Windows components.

MDASH's Architecture and Results

Palo Alto Networks' AI-Powered Vulnerability Detection

Palo Alto Networks published 26 new advisories, a record credited to its early access to frontier AI models such as Mythos. The company used AI to analyze over 130 products across SaaS-delivered and customer-operated environments, resulting in the discovery of 75 vulnerabilities.

While some vulnerabilities were attributed to external researchers, the majority were detected internally using AI. Palo Alto Networks noted that none of the 75 vulnerabilities are critical, and there is no indication that they have been exploited in the wild.

Palo Alto Networks' Results and Future Plans

Releasing 26 security advisories in a single day is a direct result of our internal security research utilizing Frontier AI models, said Palo Alto Networks CISO Marc Benoit. Volume does not equal severity; rather, it reflects our commitment to finding issues while their exploitation status remains 'none known.'"

Conclusion

The use of AI in vulnerability detection has shown significant results for Microsoft and Palo Alto Networks. As AI scanning becomes more widespread, organizations should act with urgency to outpace adversaries and prioritize remediation of vulnerabilities.

The long-term shift involves incorporating AI models directly into the software development lifecycle to prevent flaws from reaching production code. With the potential of AI in cybersecurity, the future of vulnerability discovery is likely to change significantly.


Source: SecurityWeek

Source: SecurityWeek

Powered by ZeroBot

Protect your website from bots, scrapers, and automated threats.

Try ZeroBot Free