Token Security Researcher to Present Azure MCP Vulnerability at RSAC 2026

March 19, 2026
Ariel Simon of Token Security will present research at RSAC 2026 detailing a remote code execution flaw in Microsoft’s Azure Model Context Protocol server that could allow attackers to compromise cloud environments.

Token Security researcher Ariel Simon will present new findings on a remote code execution vulnerability in Microsoft’s Azure Model Context Protocol (MCP) server at the RSA Conference 2026, announced in a press release. The session will take place on March 26, 2026, at the Moscone Center in San Francisco.

The presentation, titled “MCPwned,” will demonstrate how an unauthenticated attacker with network access could exploit the flaw to execute commands on an Azure MCP server, extract credentials, and gain control of a victim organization’s Azure and Entra ID environment.

Simon’s session will also cover how MCP servers expand attack surfaces as large language models gain access to enterprise infrastructure. Attendees will receive practical recommendations for securing MCP servers through authentication, authorization, and privilege management.

We hope you enjoyed this article.

Consider subscribing to one of our newsletters like Cybersecurity AI Weekly or Daily AI Brief.

Also, consider following us on social media:

Subscribe to Cybersecurity AI Weekly

Weekly newsletter about AI in Cybersecurity.

Trend report

Cybersecurity Trends Report 2025

Netwrix

The Cybersecurity Trends Report 2025 by Netwrix Research Lab provides insights into how organizations are adapting their cybersecurity strategies amidst growing AI adoption. The report, based on a survey of 2,150 IT professionals from 121 countries, highlights key trends such as the increase in hybrid IT environments, AI-driven security challenges, and the rising costs of security incidents.

Read more