Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google

AI Found Three Critical Microsoft RCEs on Its Own — And Got the CVEs to Prove It

XBOW's autonomous AI earned three CVEs in Microsoft's March 2026 Patch Tuesday, including critical RCEs in Bing with SYSTEM-level privilege potential.

 

Microsoft RCEs

For the first time in the history of vulnerability research, an autonomous AI system has been formally credited with discovering critical remote code execution (RCE) flaws in Microsoft's cloud infrastructure — not as a lab experiment, but as real CVEs in a real Patch Tuesday.

XBOW, an autonomous offensive security platform, was credited in Microsoft's March 2026 Patch Tuesday release with three critical vulnerabilities: CVE-2026-21536, an RCE in the Microsoft Devices Pricing Program flagged as one of the most severe issues in the entire release; and CVE-2026-32194 and CVE-2026-32191, both critical RCEs in Bing capable of granting SYSTEM-level privileges — the highest access level on a Windows machine.

What makes this notable isn't just the severity. It's how they were found. XBOW operated without access to source code, working entirely against production systems, the way a real-world attacker would. 

No hints. No scaffolding. No human researcher steering the wheel. The vulnerabilities weren't trivial input-validation misses either — they were the kind of deep, chained logic flaws that typically take experienced security researchers weeks to develop.

Microsoft's Security Response Center (MSRC) handled the disclosure cleanly: investigated fast, patched all three, and coordinated with XBOW on responsible disclosure. Technical details remain under wraps at Microsoft's request to protect customers still in the remediation window.

Ben McCarthy, lead cybersecurity engineer at Immersive, noted that while the patches are already out, the real signal here is velocity — AI-driven vulnerability discovery is compressing a timeline that used to take humans weeks into something far shorter. That gap is only going to narrow.

This isn't a proof-of-concept anymore. It's a production result with CVE numbers attached.

The implications cut both ways. Defenders can now, in theory, deploy the same class of tools to find their own blind spots before attackers do. But the bar for what attackers — or automated tools acting like them — can find unassisted just moved.

What users and organizations should do: Ensure March 2026 Patch Tuesday updates are applied immediately across all Windows and Microsoft cloud-connected environments, prioritizing systems exposed to Bing-adjacent services or Microsoft device management infrastructure.

Post a Comment