MilikMilik

AI Is Flooding the Security Market With Vulnerabilities—And Pushing Patch Management to Breaking Point

AI Is Flooding the Security Market With Vulnerabilities—And Pushing Patch Management to Breaking Point

AI Vulnerability Discovery Moves From Concept to Production

AI vulnerability discovery is no longer a lab experiment; it is now embedded in mainstream software security workflows. Microsoft has revealed an AI-driven system, codenamed MDASH, that orchestrates more than 100 AI agents to hunt for weaknesses in Windows and related products. In its first publicized outing, MDASH identified 16 previously unknown Windows vulnerabilities, including four critical RCE flaws that were quickly fixed in a Patch Tuesday rollout. Microsoft frames this as a necessary response to attackers who are already using AI to increase the speed, scale, and sophistication of intrusions. Instead of waiting for zero-day detection in the wild, vendors are now proactively scanning their own codebases with automated security scanning systems. This shift promises earlier discovery of exploitable bugs but also sets the stage for a dramatic increase in the number of patches customers must absorb.

The ‘Vulnpocalypse’: Patch Volumes Surge Across Major Vendors

The industry is entering what some researchers call a “vulnpocalypse,” as AI tools uncover vulnerabilities at unprecedented scale. Palo Alto Networks, for example, typically finds about five vulnerabilities per month. After running its entire codebase through frontier models such as Anthropic’s Mythos and other large language models, it reported 75 security issues in a single month, bundled into 26 CVEs—a roughly 15-fold jump in findings. Mozilla has seen similar spikes, fixing 423 Firefox bugs in April after earlier AI scans surfaced hundreds of flaws in a single browser version. At the same time, vendors like Ivanti, Fortinet, SAP, VMware, and n8n are issuing simultaneous patches for critical RCE flaws, SQL injection, and privilege escalation issues. None of these bugs are known to be exploited yet, but the volume and severity of the advisories illustrate how automated security scanning is reshaping the patch landscape.

AI Is Flooding the Security Market With Vulnerabilities—And Pushing Patch Management to Breaking Point

Patch Management Fatigue Becomes a Strategic Risk

This accelerating discovery wave is colliding with the practical limits of patch management. Each new batch of critical RCE flaws or authentication bypasses must be triaged, tested, and deployed without disrupting production systems. Security teams now face monthly patch drops that are multiples of what they handled previously, generating significant patch management fatigue. Experts warn that the expensive side of security—disclosure, engineering robust fixes, regression testing, and orchestrating deployments—was never funded for this scale. If rushed AI-era patches introduce instability or outages, already skeptical administrators may delay updates even further. That reluctance could undermine the benefits of proactive zero-day detection and open a window for attackers to weaponize newly disclosed bugs. In other words, AI is helping vendors find problems faster than ever, but the human and process bottlenecks in remediation are becoming the new weakest link.

From Reactive Defense to AI-Speed Security—With New Constraints

Despite the strain, AI-driven vulnerability discovery marks an important evolution from reactive to proactive security. Instead of learning about flaws only when exploitation is detected in the wild, vendors are aiming to find and fix weaknesses before advanced AI capabilities become widely available to adversaries. Security researchers argue that all vendors should use whatever tools they have to locate bugs as early as possible, ideally before software ships. Yet shifting to AI-speed security introduces fresh constraints: organizations need more automation in patch assessment, better prioritization of zero-day detection outputs, and closer coordination between development, security, and operations. Over time, if AI helps clean up long-standing code risks, monthly patch counts might stabilize or even decline. For now, enterprises must adapt their processes and tooling to survive a transitional period defined by relentless scan results and growing operational pressure.

Comments
Say Something...
No comments yet. Be the first to share your thoughts!