M
MSR Intelligence
← Back to Archive
🔭Technology Scout

Technology Scout - February 01, 2026

February 1, 2026

Day 726 of Building the Future

The Curmudgeon’s Take

**Scout's Analysis** AI agents have become enterprise security's biggest blind spot. The BodySnatcher vulnerability in ServiceNow and n8n's complete takeover flaw (CVE-2026-21858, CVSS 10.0) both exploit the same fundamental weakness: AI agents run with excessive privileges that bypass traditional security controls. **Three critical trends converging:** **Agent proliferation without security frameworks.** Gartner forecasts 40% of enterprise apps will integrate AI agents by year-end, up from 5% in 2025, but Palo Alto's CSO warns they're creating "superuser problems" as the new insider threat. **Foundation model consolidation accelerating.** OpenAI's retirement of GPT-4o and older models on February 13th reflects rapid user migration to GPT-5.2, while the release of GPT-5.2-Codex introduces powerful cybersecurity capabilities with inherent dual-use risks. **Microsoft's aggressive AI monetization.** VS Code's elimination of free IntelliCode forces developers toward $120-228 annual Copilot subscriptions, while 114 vulnerabilities in January's Patch Tuesday (including two actively exploited zero-days) show security complexity isn't decreasing. **Immediate action required:** The combination of two 10.0 CVSS vulnerabilities plus actively exploited Microsoft zero-days demands emergency patching this week. **Recommendation:** Implement agent-specific IAM policies that enforce least-privilege principles and audit all AI agent permissions before the February 13th model transitions.
🏗️

How This Affects MSR

**CRITICAL Security Connection**: The AI Agents Authorization Bypass vulnerability directly impacts MSR's 33-agent architecture - our agents likely run with broad Supabase permissions that could bypass user-level access controls, requiring immediate IAM review of agent permissions vs. user permissions. **OpenAI Model Updates**: MSR should evaluate GPT-5.2-Codex for potential integration as it offers stronger cybersecurity capabilities than current Claude integration, though the February 13th retirement of older GPT models won't directly affect our Anthropic-based stack.

Categories:10
Discoveries:39
13 Critical
19 High
10 Vendors
Technology Scout - February 01, 2026
🔭

Technology Scout

Daily Intelligence Brief - Day 726

Report Date: 2026-02-01

10
Categories
39
Discoveries
13
Critical
19
High

AI Agents & Orchestration (8)

BodySnatcher: Agentic AI Security Vulnerability in ServiceNow ExposedCRITICAL

AppOmni researchers disclosed a critical vulnerability that allows unauthenticated attackers to impersonate administrators and execute AI agents to override security controls and create backdoor accounts with full privileges. ServiceNow rotated provider credentials and removed the powerful AI agent shown in the proof-of-concept.

Source: AppOmni

Critical RCE flaw allows full takeover of n8n AI workflow platformCRITICAL

A critical vulnerability (CVE-2026-21858) with severity rating 10.0 enables unauthenticated attackers to completely take over local n8n deployments, execute commands on the underlying system, and extract sensitive corporate data workflows. The flaw was silently patched in version 1.121.0 released in November.

Source: CSO Online

AI Agents Are Becoming Authorization Bypass PathsHIGH

Enterprise AI agents often run with broad permissions, allowing actions beyond user access and weakening IAM controls. Traditional security controls are poorly suited for agent-mediated workflows as IAM systems evaluate permissions against the agent's identity, not the requester's.

Source: The Hacker News

AI agents 2026's biggest insider threat: PANW security bossHIGH

Palo Alto Networks Chief Security Officer warns that AI agents represent the new insider threat as they're granted broad permissions creating 'superuser' problems. Gartner predicts 40% of enterprise applications will integrate with AI agents by end of 2026, up from less than 5% in 2025.

Source: The Register

Zero-Day Attack Drives 113-Vulnerability Patch Tuesday Release to Start 2026CRITICAL

Microsoft released fixes for 113 vulnerabilities including zero-day CVE-2026-20805 being actively exploited. The release includes eight critical flaws and addresses a Secure Boot certificate expiration vulnerability (CVE-2026-21265) that could cause major disruptions if not addressed before June.

Source: Redmond Magazine

LLM & Foundation Models (6)

OpenAI plans to phase out GPT-5, GPT-4o and other older models: Know moreHIGH

OpenAI announced it will retire GPT-5 Instant, GPT-5 Thinking, GPT-4o, GPT-4.1, GPT-4.1 mini, and o4-mini from ChatGPT on February 13, 2026. The company cited low usage with only 0.1% of users still choosing GPT-4o daily, as most have shifted to GPT-5.2.

Source: Business Standard

OpenAI is retiring famous GPT-4o model, says GPT 5.2 is good enoughHIGH

OpenAI confirmed retirement of multiple older models including GPT-4o on February 13, 2026, stating that GPT-5.2 has now met expectations and incorporates feedback from users who preferred GPT-4o's conversational style. The vast majority of usage has shifted to GPT-5.2.

Source: BleepingComputer

Introducing GPT-5.2-CodexCRITICAL

OpenAI released GPT-5.2-Codex, described as the most advanced agentic coding model for complex software engineering with significantly stronger cybersecurity capabilities. A security researcher recently used the model to discover a React vulnerability, demonstrating both defensive potential and dual-use risks.

Source: OpenAI

Continuously hardening ChatGPT Atlas against prompt injection attacksCRITICAL

OpenAI shipped a security update to ChatGPT Atlas's browser agent on January 7, 2026, including a newly adversarially trained model and strengthened safeguards against prompt injection attacks. The update addresses a new class of attacks discovered through internal automated red teaming.

Source: OpenAI

Introducing GPT-5.2HIGH

OpenAI released GPT-5.2 as the most capable model series yet for professional knowledge work. The model outperforms industry professionals on 70.9% of GDPval knowledge work tasks across 44 occupations and is now rolling out to paid ChatGPT plans with API access already available.

Source: OpenAI

Security & Vulnerabilities (8)

MediaTek Product Security Bulletin February 2026HIGH

MediaTek published their February 2026 Product Security Bulletin containing details of security vulnerabilities affecting certain MediaTek chipsets. The bulletin was published on February 2, 2026.

Source: MediaTek Corp

Critical Vulnerability Exposes n8n Instances to Takeover AttacksCRITICAL

CVE-2026-21858, a critical n8n vulnerability with CVSS score 10.0, allows unauthenticated remote code execution and instance takeover. The vulnerability affects the platform's webhook and file-handling logic and impacts approximately 100,000 servers globally.

Source: SecurityWeek

CVE-2026-20805: Microsoft Fixes Actively Exploited Windows Desktop Manager Zero-DayCRITICAL

CISA added CVE-2026-20805 to its Known Exploited Vulnerabilities catalog with federal agencies required to apply updates by February 3, 2026. The zero-day vulnerability in Windows Desktop Window Manager allows information disclosure and has been actively exploited.

Source: SOC Prime

Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively ExploitedCRITICAL

Microsoft released its January 2026 Patch Tuesday addressing 114 security flaws, including CVE-2026-20805 actively exploited in the wild. The update includes 8 critical and 106 important severity vulnerabilities, marking the third-largest January Patch Tuesday release.

Source: The Hacker News

CVE-2026-21509: Actively Exploited Microsoft Office Zero-Day Forces Emergency PatchCRITICAL

Microsoft issued an emergency out-of-band update on January 26, 2026, to fix CVE-2026-21509, a zero-day vulnerability in Microsoft Office under active exploitation. The security feature bypass vulnerability affects Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps for Enterprise.

Source: SOC Prime

Developer Tools & IDEs (6)

VS Code Pushes Hard on AI Agents While Quietly Killing Free Code CompletionHIGH

Microsoft ended free IntelliCode completion in VS Code 1.108, shifting users to subscription-based GitHub Copilot with usage caps of 2,000 completions and 50 chat requests per month. The update introduces Agent HQ for managing multiple AI agents and adds 10 new agent features, but security concerns exist including a YOLO setting that disables safety protections.

Source: DevOps.com

Microsoft Quietly Kills IntelliCode as AI Strategy Shifts to Subscription CopilotHIGH

Microsoft officially deprecated IntelliCode extensions in VS Code in November 2025, with over 70 million downloads affected. Users now must pay $120-$228 annually for heavy AI assistance usage, marking a shift from free local AI to cloud-based subscription services.

Source: Visual Studio Magazine

December 2025 (version 1.108)

VS Code 1.108 was released January 8, 2026, introducing Agent Skills for GitHub Copilot to enable domain-specific automation. The release includes terminal improvements with curly underline rendering fixes, expanded glyph support to nearly 800 characters, and enhanced breadcrumbs functionality.

Source: Visual Studio Code Official

VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSXCRITICAL

AI-based VS Code forks were found recommending unclaimed extensions in Open VSX marketplace, creating supply chain security risks. This allows malicious actors to upload fake extensions and potentially compromise developer systems through the recommendation system.

Source: The Hacker News

Iteration Plan for January 2026

Microsoft's official VS Code development roadmap shows a 4-week iteration planned for January 2026 with shipping scheduled for early February 2026. The plan includes fixes for Python environments, terminal API improvements, and Chat Code Review command additions.

Source: GitHub - Microsoft/vscode

Cloud & Infrastructure (6)

AWS Weekly Roundup: Amazon EC2 G7e instances, Amazon Corretto updates, and more (January 26, 2026)HIGH

Amazon EC2 G7e instances with NVIDIA RTX PRO 6000 Blackwell Server Edition GPUs are now generally available, delivering up to 2.3 times better inference performance than G6e instances. These instances support up to 8 GPUs with 768 GB total GPU memory for AI models up to 70B parameters.

Source: AWS News Blog

AWS Weekly Roundup: Kiro CLI latest features, AWS European Sovereign Cloud, EC2 X8i instances, and more (January 19, 2026)HIGH

AWS European Sovereign Cloud is now generally available to all customers following a 2023 announcement. Amazon EC2 X8i instances, powered by custom Intel Xeon 6 processors with 3.9 GHz sustained all-core turbo frequency, are now GA with SAP certification.

Source: AWS News Blog

AWS Launches AWS European Sovereign Cloud and Announces Expansion Across EuropeHIGH

AWS launched the AWS European Sovereign Cloud with independent data governance and robust control mechanisms specifically for European governments and businesses. The company is also expanding AWS Local Zones to three additional countries within the EU.

Source: Business Wire

AWS Weekly Roundup: AWS Lambda for .NET 10, AWS Client VPN quickstart, Best of AWS re:Invent, and more (January 12, 2026)

AWS Lambda now supports .NET 10 for serverless applications with managed runtime and automatic updates. Amazon Quick Suite added integrations for AI agents with GitHub, Notion, Canva, Box, and other services. The Global 10,000 AIdeas Competition deadline is January 21, 2026.

Source: AWS News Blog

EC2 Capacity Manager now includes Spot interruption metrics

AWS announced new Spot interruption metrics for Amazon EC2 Capacity Manager on January 5, 2026. The feature includes three new metrics: Spot Total Count, Spot Total Interruptions, and Spot Interruption Rate to help optimize Spot instance strategies.

Source: AWS What's New

Web Frameworks (5)

Security Advisory: CVE-2025-66478CRITICAL

A critical vulnerability with CVSS 10.0 rating was identified in React Server Components protocol, allowing remote code execution. Patched versions include Next.js 15.0.5 through 16.0.7, with users advised to upgrade immediately.

Source: Next.js Official Blog

Critical Security Alert: Unauthenticated RCE in React CVE-2025-55182 & Next.js CVE-2025-66478CRITICAL

Two critical vulnerabilities allowing unauthenticated remote code execution were disclosed, affecting default Next.js configurations. Even newly generated Next.js apps created with create-next-app are immediately vulnerable without modifications.

Source: Upwind Security

CVE-2026-23864: React and Next.js Denial of Service via Memory ExhaustionHIGH

A newly disclosed DoS vulnerability affects React Server Components, causing memory exhaustion when specially crafted HTTP requests are sent to servers. Akamai deployed protective rules while recommending immediate vendor patches.

Source: Akamai

CVE-2025-29927 – Understanding the Next.js Middleware VulnerabilityHIGH

A vulnerability affecting Next.js versions 11.1.4 through 15.2.2 allows bypassing security by adding a specific HTTP header. The flaw can disable all security checks with a single x-middleware-subrequest header.

Source: Security Boulevard

Security Bulletin: CVE-2025-55184 and CVE-2025-55183HIGH

Two additional vulnerabilities were discovered following the React2Shell disclosure: a high-severity Denial of Service issue and a medium-severity Source Code Exposure vulnerability. Both affect React 19 and Next.js versions 13.x through 16.x.

Source: Vercel

Generated by MSR Technology Scout

Daily technology intelligence for development teams

Subscribe  |  Manage Subscriptions

MSR Research LLC | Austin, TX | msrresearch.com