Microsoft Patch Tuesday March 2026 – 78 Vulnerabilities Fixed, Including One Zero-day


Microsoft released its March 2026 Patch Tuesday security update on March 10, 2026, addressing 78 vulnerabilities across Windows, Microsoft Office, Azure, SQL Server, and .NET.

The update includes one actively exploited zero-day vulnerability and multiple Critical-rated flaws demanding immediate attention from security teams.

The most urgent fix this month is CVE-2026-21262, the sole zero-day in this release. Organizations are strongly advised to prioritize patching this vulnerability without delay.

While Microsoft has not publicly attributed active exploitation to a specific threat actor, the presence of a zero-day underscores the need for rapid patch deployment across all affected environments.

Additionally, CVE-2026-26127, a .NET Denial of Service vulnerability, has been marked as publicly disclosed, meaning exploit details were available before the patch was released. This classification raises the risk of opportunistic exploitation even without confirmed in-the-wild attacks.

Row LabelsCount of Impact
Denial of Service4
Elevation of Privilege43
Information Disclosure9
Remote Code Execution16
Security Feature Bypass2
Spoofing4
Grand Total78

Critical Vulnerabilities Patched

Three vulnerabilities received Microsoft’s highest Critical severity rating:

google

  • CVE-2026-26144 – Microsoft Excel Information Disclosure Vulnerability affecting Microsoft Office Excel. Despite being classified as an information disclosure flaw, its Critical rating indicates that successful exploitation could expose highly sensitive data.
  • CVE-2026-26113 – Microsoft Office Remote Code Execution Vulnerability. An attacker who successfully exploits this flaw could execute arbitrary code in the context of the current user, making it a high-priority fix for enterprise environments.
  • CVE-2026-26110 – A second Microsoft Office Remote Code Execution Vulnerability. Like CVE-2026-26113, this flaw targets Office and represents a significant code execution risk, particularly in environments where users regularly open externally sourced documents.

Consistent with prior months, Elevation of Privilege (EoP) flaws make up the largest category in this update. Notable EoP vulnerabilities include CVE-2026-26132 in the Windows Kernel, CVE-2026-26128 in Windows SMB Server, CVE-2026-25187 in Winlogon, CVE-2026-25189 in the Windows DWM Core Library, and CVE-2026-26148 affecting the Microsoft Azure AD SSH Login extension for Linux.

Cloud-focused fixes also include CVE-2026-26141 in the Hybrid Worker Extension for Arc-enabled Windows VMs, CVE-2026-26117 in the Azure Connected Machine Agent, and CVE-2026-26118 in Azure MCP Server Tools.

Several RCE vulnerabilities target critical infrastructure components. CVE-2026-26114 and CVE-2026-26106 both affect Microsoft SharePoint Server, which is commonly exposed to internal networks and represents a high-value target.

CVE-2026-26111 targets the Windows Routing and Remote Access Service (RRAS), and CVE-2026-25190 addresses a GDI Remote Code Execution Vulnerability in Windows GDI. Four separate Excel RCE flaws (CVE-2026-26112, CVE-2026-26109, CVE-2026-26108, CVE-2026-26107) were also patched this month.

This month’s release also covers CVE-2026-26130 (ASP.NET Core Denial of Service), CVE-2026-26131 (.NET Elevation of Privilege), CVE-2026-26123 (Microsoft Authenticator Information Disclosure), CVE-2026-26121 (Azure IoT Explorer Spoofing), CVE-2026-26105 (SharePoint Spoofing), CVE-2026-25188 (Windows Telephony Service EoP), CVE-2026-25186 (Windows Accessibility Infrastructure Information Disclosure), and CVE-2026-26116 and CVE-2026-26115 (SQL Server Elevation of Privilege).

CVE NumberCVE Title
CVE-2026-20967System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability
CVE-2026-21262SQL Server Elevation of Privilege Vulnerability
CVE-2026-23654GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability
CVE-2026-23656Windows App Installer Spoofing Vulnerability
CVE-2026-23660Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
CVE-2026-23661Azure IoT Explorer Information Disclosure Vulnerability
CVE-2026-23662Azure IoT Explorer Information Disclosure Vulnerability
CVE-2026-23664Azure IoT Explorer Information Disclosure Vulnerability
CVE-2026-23665Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability
CVE-2026-23667Broadcast DVR Elevation of Privilege Vulnerability
CVE-2026-23668Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-23669Windows Print Spooler Remote Code Execution Vulnerability
CVE-2026-23671Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability
CVE-2026-23672Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability
CVE-2026-23673Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVE-2026-23674MapUrlToZone Security Feature Bypass Vulnerability
CVE-2026-24282Push message Routing Service Elevation of Privilege Vulnerability
CVE-2026-24283Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability
CVE-2026-24285Win32k Elevation of Privilege Vulnerability
CVE-2026-24287Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-24288Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2026-24289Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-24290Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-24291Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability
CVE-2026-24292Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-24293Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-24294Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-24295Windows Device Association Service Elevation of Privilege Vulnerability
CVE-2026-24296Windows Device Association Service Elevation of Privilege Vulnerability
CVE-2026-24297Windows Kerberos Security Feature Bypass Vulnerability
CVE-2026-25165Performance Counters for Windows Elevation of Privilege Vulnerability
CVE-2026-25166Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability
CVE-2026-25167Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2026-25168Windows Graphics Component Denial of Service Vulnerability
CVE-2026-25169Windows Graphics Component Denial of Service Vulnerability
CVE-2026-25170Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2026-25171Windows Authentication Elevation of Privilege Vulnerability
CVE-2026-25172Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-25173Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-25174Windows Extensible File Allocation Table Elevation of Privilege Vulnerability
CVE-2026-25175Windows NTFS Elevation of Privilege Vulnerability
CVE-2026-25176Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-25177Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2026-25178Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-25179Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-25180Windows Graphics Component Information Disclosure Vulnerability
CVE-2026-25181GDI+ Information Disclosure Vulnerability
CVE-2026-25185Windows Shell Link Processing Spoofing Vulnerability
CVE-2026-25186Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability
CVE-2026-25187Winlogon Elevation of Privilege Vulnerability
CVE-2026-25188Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-25189Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-25190GDI Remote Code Execution Vulnerability
CVE-2026-26105Microsoft SharePoint Server Spoofing Vulnerability
CVE-2026-26106Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-26107Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26108Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26109Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26110Microsoft Office Remote Code Execution Vulnerability
CVE-2026-26111Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-26112Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26113Microsoft Office Remote Code Execution Vulnerability
CVE-2026-26114Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-26115SQL Server Elevation of Privilege Vulnerability
CVE-2026-26116SQL Server Elevation of Privilege Vulnerability
CVE-2026-26117Arc Enabled Servers – Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2026-26118Azure MCP Server Tools Elevation of Privilege Vulnerability
CVE-2026-26121Azure IOT Explorer Spoofing Vulnerability
CVE-2026-26123Microsoft Authenticator Information Disclosure Vulnerability
CVE-2026-26127.NET Denial of Service Vulnerability
CVE-2026-26128Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-26130ASP.NET Core Denial of Service Vulnerability
CVE-2026-26131.NET Elevation of Privilege Vulnerability
CVE-2026-26132Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-26134Microsoft Office Elevation of Privilege Vulnerability
CVE-2026-26141Hybrid Worker Extension (Arc‑enabled Windows VMs) Elevation of Privilege Vulnerability
CVE-2026-26144Microsoft Excel Information Disclosure Vulnerability
CVE-2026-26148Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability

Security teams should apply all March 2026 patches as soon as possible, with immediate priority on CVE-2026-21262, the three Critical Office and Excel flaws, the Windows Kernel and SMB Server EoP vulnerabilities, and the SharePoint RCE bugs. All affected product lines require customer action as confirmed by Microsoft.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link