Microsoft Fixes 79 Flaws in March Patch Tuesday, Including Two 0-Days


Microsoft has released its March 2026 Patch Tuesday security updates, addressing dozens of vulnerabilities across Windows, enterprise platforms, and developer frameworks. The monthly update resolves 79 security flaws, including three critical vulnerabilities and two publicly disclosed zero-day issues, according to security researchers and vulnerability trackers.

Patch Tuesday, Microsoft’s monthly security update cycle delivered on the second Tuesday of each month, provides fixes for security vulnerabilities affecting its products, from Windows and Office to cloud services and developer frameworks.

Overview of the March 2026 Patch Tuesday

The March release includes fixes for 79 Microsoft CVEs, most rated “Important,” with a smaller number categorized as “Critical.”

Breakdown of vulnerabilities:

  1. 3 Critical severity vulnerabilities
  2. 79 total vulnerabilities addressed
  3. 76 Important severity vulnerabilities
  4. 2 publicly disclosed vulnerabilities (zero-days)
  5. No confirmed active exploitation reported at release

Many of the patched issues affect widely deployed Microsoft technologies such as Windows components, SQL Server, .NET, Office, SharePoint, and Azure infrastructure, indicating broad exposure across enterprise environments.

The update also coincided with an Edge browser security update addressing several Chromium-related vulnerabilities, which Microsoft distributes through its browser update channel.

Two Publicly Disclosed Zero-Day Vulnerabilities

This month’s release includes two vulnerabilities that were publicly disclosed before patches became available, though there is currently no evidence they were exploited in attacks.

CVE-2026-21262 – SQL Server Elevation of Privilege

  • Affects Microsoft SQL Server.
  • Rated Important, CVSS score 8.8.
  • Allows an authenticated attacker to escalate privileges to the SQL Server administrator (sysadmin) level.

CVE-2026-26127 – .NET Denial-of-Service

  • Caused by an out-of-bounds read vulnerability.
  • Impacts the .NET platform and associated packages.
  • Could allow a remote attacker to trigger a denial-of-service condition over the network.

Both vulnerabilities were disclosed publicly prior to patch release, but security researchers note the risk of exploitation appears limited so far.

Critical Vulnerabilities and High-Risk Attack Paths

Among the vulnerabilities patched this month are three classified as Critical, including flaws that could allow remote code execution or information disclosure. One of the most severe issues addressed is:

CVE-2026-21536

  • CVSS score 9.8
  • Remote code execution vulnerability
  • Affects Microsoft’s Devices Pricing Program service.

Several vulnerabilities with a higher likelihood of exploitation affect core Windows infrastructure components, including:

  • Windows Kernel
  • Windows SMB Server
  • Microsoft Graphics Component
  • Windows Accessibility Infrastructure
  • Winlogon authentication component

Security researchers note that while none of the vulnerabilities were confirmed to have been exploited at disclosure time, some were categorized by Microsoft as “Exploitation More Likely,” meaning attackers may attempt to weaponize them after patches are released.

Most Common Vulnerability Types

The March update reflects a pattern common in Microsoft’s patch releases, where privilege escalation issues make up the majority of vulnerabilities. The estimated distribution of vulnerability categories includes:

  • Denial of Service
  • Information Disclosure
  • Elevation of Privilege – about 55%
  • Remote Code Execution – about 20%
  • Security feature bypass and spoofing

Privilege escalation vulnerabilities are especially significant in enterprise environments because attackers frequently chain them with other exploits to gain higher access after initial compromise.

Wide Range of Affected Microsoft Products

It is worth pointing out that the March 2026 Patch Tuesday affects a large portion of Microsoft’s products, including both on-premise and cloud services. Key affected technologies include:

  • SQL Server
  • SharePoint Server
  • Microsoft Office and Excel
  • Windows NTFS and SMB Server
  • Active Directory Domain Services
  • Windows Kerberos authentication
  • System Center Operations Manager
  • Azure services and virtual machine tools
  • Windows Kernel and core operating system components

This broad coverage makes the update particularly important for enterprise administrators managing Windows infrastructure, identity systems, and database platforms.

Security Guidance for Organizations

Security teams are advised to prioritize patch deployment based on exposure and system criticality. Systems with internet-facing services, privileged workloads, or sensitive data should receive updates first. Experts also recommend focusing on patches affecting:

  • Database servers
  • File and network services
  • Identity and authentication services
  • Public-facing applications and APIs

Although the two disclosed zero-days have not yet been exploited, researchers warn that attackers often analyze Patch Tuesday releases to identify new attack opportunities.

If you use the Windows operating system at home or work, install the latest Patch Tuesday updates to reduce the risk of cyberattacks that exploit any of the 79 vulnerabilities to gain access to your system.





Source link