AI-assisted code scanning uncovered a nine-year-old vulnerability in Linux that researchers exploited with just 10 lines of proof-of-concept code. The flaw lay dormant since its introduction, evading detection until automated analysis tools identified it. A patch is already available, giving defenders an immediate remediation path.

The discovery underscores how legacy codebases harbor exploitable gaps despite years of scrutiny. Traditional manual code review missed this bug entirely. AI-powered scanning now catches vulnerabilities at scale by analyzing patterns humans overlook across millions of lines of code.

The short exploit length indicates low complexity. Attackers with basic skills can weaponize such bugs quickly once disclosed. Organizations running vulnerable Linux versions face immediate risk until patching completes.

This represents a broader trend. Security teams increasingly deploy machine learning tools to audit existing software rather than waiting for vulnerability reports from external researchers or bug bounties. The approach finds real bugs in production systems before threat actors do.

Defenders should prioritize patching this flaw across Linux deployments. Teams should also evaluate AI-assisted scanning for their own codebases to identify similar dormant issues before exploitation occurs.