Microsoft Fixes 79 Vulnerabilities in March 2026 Patch Tuesday, Mitigating Two Exploited 0-Days


Microsoft has released its March 2026 Patch Tuesday updates, successfully addressing 79 security vulnerabilities across various products and mitigating two publicly disclosed zero-day flaws.

These critical security updates provide essential fixes for enterprise systems, including Microsoft Windows, Office, SQL Server, and the .NET framework.

March 2026 Vulnerability Overview

The March 2026 Patch Tuesday addresses a wide range of security flaws impacting modern infrastructure.

Among the 79 patched vulnerabilities, three are classified as critical. The remaining flaws are rated as important or low severity.

The vulnerabilities span several categories, heavily featuring 46 elevation of privilege flaws and 18 remote code execution risks.

Because attackers often target known vulnerabilities quickly, administrators must apply these patches promptly to protect enterprise networks from unauthorized access and potential data breaches.

Delaying updates can leave systems exposed to cybercriminal groups and ransomware operators.​

Microsoft patched two zero-day vulnerabilities that were publicly disclosed before the official fix was available.

While neither flaw has been actively exploited in the wild yet, their public disclosure significantly increases the risk of threat actors developing active exploits.

The notable zero-day flaws include:

  • SQL Server Elevation of Privilege: Tracked as CVE-2026-21262, this flaw allows an attacker with authorized access to elevate their privileges to an administrator level over a network.
  • .NET Denial-of-Service: This vulnerability affects the .NET framework, allowing attackers to disrupt business operations by causing service outages.​

Patched Vulnerabilities Data

Below is the table of Microsoft vulnerabilities based on the provided security update guide.

CVE IDVulnerability NameTypeSeverity
CVE-2024-29059.NET Framework Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2024-29057Microsoft Edge (Chromium-based) Spoofing VulnerabilitySpoofingLow
CVE-2024-28916Xbox Gaming Services Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2024-26247Microsoft Edge (Chromium-based) Security Feature Bypass VulnerabilitySecurity Feature BypassLow
CVE-2024-26246Microsoft Edge (Chromium-based) Security Feature Bypass VulnerabilitySecurity Feature BypassLow
CVE-2024-26204Outlook for Android Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2024-26203Azure Data Studio Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2024-26201Microsoft Intune Linux Agent Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2024-26199Microsoft Office Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2024-26198Microsoft Exchange Server Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2024-26197Windows Standards-Based Storage Management Service Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2024-26196Microsoft Edge for Android (Chromium-based) Information Disclosure VulnerabilityInformation DisclosureLow
CVE-2024-26192Microsoft Edge (Chromium-based) Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2024-26190Microsoft QUIC Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2024-26188Microsoft Edge (Chromium-based) Spoofing VulnerabilitySpoofingLow
CVE-2024-26185Windows Compressed Folder Tampering VulnerabilityTamperingImportant
CVE-2024-26182Windows Kernel Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2024-26181Windows Kernel Denial of Service VulnerabilityDenial of ServiceImportant
CVE-2024-26178Windows Kernel Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2024-26177Windows Kernel Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2024-26176Windows Kernel Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2024-26174Windows Kernel Information Disclosure VulnerabilityInformation DisclosureImportant
CVE-2024-26173Windows Kernel Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2024-26170Windows Composite Image File System (CimFS) Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2024-26169Windows Error Reporting Service Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2024-26167Microsoft Edge for Android Spoofing VulnerabilitySpoofingLow
CVE-2024-26166Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2024-26165Visual Studio Code Elevation of Privilege VulnerabilityElevation of PrivilegeImportant
CVE-2024-26164Microsoft Django Backend for SQL Server Remote Code Execution VulnerabilityRemote Code ExecutionImportant
CVE-2024-26163Microsoft Edge (Chromium-based) Security Feature Bypass VulnerabilitySecurity Feature BypassLow

To maintain a strong security posture, organizations should follow these mitigation steps:

  • Deploy the March 2026 security updates immediately, prioritizing internet-facing and business-critical servers.
  • Test patches in a staging environment before full deployment to avoid operational disruptions.​
  • Monitor SQL Server and .NET applications closely for unusual network traffic or unauthorized access attempts.
  • Review Microsoft Office configurations, as certain flaws can be triggered via the preview pane without opening a malicious file.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link