Microsoft's MDASH AI System Found 16 Windows Flaws Before Attackers Did
Microsoft unveiled MDASH, a multi-agent AI system that discovered 16 Windows vulnerabilities including 4 critical RCEs in networking and auth stacks. Now available in limited preview.
Microsoft's Autonomous Code Security team unveiled MDASH on May 12, a multi-agent AI system designed to find exploitable vulnerabilities at scale before attackers can. The system discovered 16 flaws in Windows networking and authentication components—including four critical remote code execution vulnerabilities—that were patched in last week's Patch Tuesday release.
MDASH represents a significant escalation in the AI-powered security arms race, scoring 88.45% on the CyberGym benchmark to top the industry leaderboard by roughly five percentage points.
What Is MDASH?
MDASH stands for Multi-model agentic scanning harness. Unlike single-model approaches that apply one AI system to code analysis, MDASH orchestrates more than 100 specialized AI agents across an ensemble of frontier and distilled models.
The architecture employs different model types for different tasks:
- State-of-the-art reasoning models for complex vulnerability analysis
- Distilled models for high-volume validation passes
- Separate SOTA models for counterpoint analysis and verification
This multi-agent approach enables MDASH to discover, debate, and prove exploitable bugs end-to-end without human intervention during the analysis phase.
How It Works
MDASH operates through a structured pipeline:
- Ingestion: Accepts source code targets for analysis
- Indexing: Builds language-aware indices of the codebase
- Attack Surface Mapping: Analyzes past commits to draw threat models and identify high-risk code paths
- Auditing: Specialized auditor agents examine candidate code paths for vulnerabilities
- Debate: Independent debater agents verify findings through adversarial analysis
- Deduplication: Groups semantically similar findings to reduce noise
- Proof Generation: Demonstrates actual exploitability of confirmed vulnerabilities
The debate phase is notable—it addresses a persistent challenge in AI security tools where high false positive rates overwhelm security teams. By having separate AI agents challenge initial findings, MDASH reduces the burden of triaging spurious results.
What MDASH Found
Applied to Windows networking and authentication stacks, MDASH identified 16 vulnerabilities patched on May 12:
Critical Remote Code Execution Flaws:
- CVE-2026-33824 (CVSS 9.8): Double-free vulnerability in the IKEv2 protocol
- CVE-2026-33827 (CVSS 8.1): Race condition in TCP/IP affecting IPSec-enabled systems
- Two additional critical RCEs in Windows kernel TCP/IP stack components
The IKEv2 and IPSec vulnerabilities are particularly concerning for enterprises using VPN infrastructure. Double-free bugs and race conditions represent complex vulnerability classes that traditional static analysis tools often miss.
Benchmark Performance
Microsoft tested MDASH against pre-patch snapshots of heavily reviewed Windows components:
- 96% recall on 28 MSRC cases spanning five years in
clfs.sys - 100% recall on 7 MSRC cases spanning five years in
tcpip.sys - 88.45% on CyberGym, placing first on the public leaderboard
The CyberGym benchmark evaluates AI systems on real-world vulnerability discovery tasks. MDASH's lead over the second-place system—roughly five percentage points—suggests meaningful capability differences rather than marginal improvements.
Why This Matters
AI-powered vulnerability discovery has moved from research concept to production reality. Microsoft joins an emerging field that includes Anthropic's Project Glasswing (Claude Mythos) and similar efforts from major AI labs.
The strategic implications are significant:
For defenders: Automated vulnerability discovery at scale could help software vendors identify and patch flaws before attackers find them. Microsoft's willingness to run MDASH against its own heavily-audited code suggests confidence in the approach.
For attackers: The same technology could be weaponized for offensive purposes. Google's recent detection of a zero-day exploit likely developed with AI assistance demonstrates that threat actors are already exploring this frontier.
For the industry: The speed advantage matters. If defenders can find and patch vulnerabilities faster than attackers can discover and weaponize them, the economics of exploitation shift. But if offensive AI tools outpace defensive ones, the opposite occurs.
Availability
MDASH is currently in limited private preview with select Microsoft customers. The company has not announced general availability timelines or pricing.
Microsoft positions MDASH as augmenting rather than replacing human security researchers. The system handles the high-volume analysis of candidate code paths, surfacing potential issues for human validation and remediation.
The Broader AI Security Arms Race
MDASH's debut highlights an accelerating competition between AI systems finding vulnerabilities and AI systems creating exploits. Microsoft's announcement arrives weeks after Google disclosed that threat actors used AI to develop a working zero-day exploit for the first time.
Organizations should anticipate:
- Faster exploit development as AI tools lower the barrier to weaponization
- Increased patch urgency as the window between disclosure and exploitation narrows
- New attack surfaces as AI systems themselves become targets
Security teams with long patching cycles face particular pressure. The combination of AI-accelerated vulnerability discovery and AI-assisted exploit development compresses the timeline between "patch available" and "active exploitation."
For teams evaluating AI security tools, MDASH's benchmark performance provides a useful reference point. However, benchmark scores don't capture operational factors like integration complexity, false positive rates in production environments, or the expertise required to act on findings.
Frequently Asked Questions
Is MDASH available to the public? Not yet. MDASH is in limited private preview with select Microsoft customers. General availability has not been announced.
Does MDASH only analyze Windows code? Microsoft describes MDASH as "model-agnostic" and language-aware, suggesting applicability beyond Windows. However, public disclosures have focused on Windows vulnerability discovery.
How does MDASH compare to traditional static analysis tools? MDASH's multi-agent architecture and reasoning capabilities enable it to identify complex vulnerability classes—like the race conditions and double-frees it found—that traditional pattern-matching tools often miss. The 96-100% recall rates on historical MSRC cases suggest meaningful improvement over existing approaches.
Related Articles
Microsoft Patches 3 Copilot Flaws That Leaked Sensitive Data
CVE-2026-26129, CVE-2026-26164, and CVE-2026-33111 allowed information disclosure via injection attacks in Microsoft 365 Copilot. No admin action required.
May 9, 2026GhostLock Locks 500K Files in 3 Minutes Without Encryption
A new proof-of-concept tool abuses Windows CreateFileW API to block file access across SMB shares. The technique evades all tested EDR products and requires no elevated privileges.
May 12, 2026Microsoft Copilot Bug Exposed Confidential Emails for Weeks
Microsoft confirms Copilot bug bypassed DLP policies, reading confidential emails without authorization. European Parliament blocked Copilot over concerns.
Feb 25, 2026Microsoft Semantic Kernel RCE Flaw Scores Perfect 10.0 CVSS
CVE-2026-26030 in Microsoft's Semantic Kernel Python SDK enables unauthenticated RCE through InMemoryVectorStore. Upgrade to 1.39.4 immediately.
Feb 20, 2026