Microsoft Patch Tuesday March 2026: 83 Vulnerabilities Fixed, Including Two Zero-Days

Microsoft’s March 2026 Patch Tuesday: Addressing 83 Vulnerabilities, Including Two Publicly Disclosed Zero-Days

On March 10, 2026, Microsoft released its latest Patch Tuesday updates, addressing 83 security vulnerabilities across a wide range of its products, including Windows, Office, SQL Server, Azure, and .NET. This release is particularly noteworthy as it includes fixes for two publicly disclosed zero-day vulnerabilities, though neither has been reported as actively exploited at the time of release.

Overview of the March 2026 Security Updates

The March 2026 Patch Tuesday encompasses a total of 83 vulnerabilities, categorized as follows:

– 46 Elevation of Privilege vulnerabilities
– 18 Remote Code Execution vulnerabilities
– 10 Information Disclosure vulnerabilities
– 4 Denial of Service vulnerabilities
– 4 Spoofing vulnerabilities
– 2 Security Feature Bypass vulnerabilities

Among these, eight vulnerabilities are rated as Critical, while the remaining 75 are classified as Important.

Detailed Examination of the Publicly Disclosed Zero-Day Vulnerabilities

The two zero-day vulnerabilities addressed in this update are:

1. CVE-2026-21262 | SQL Server Elevation of Privilege Vulnerability

– Description: This vulnerability arises from improper access control within SQL Server, allowing an authenticated attacker to escalate their privileges to that of a sysadmin.
– Impact: Exploitation could grant attackers elevated administrative permissions within SQL Server environments, potentially leading to unauthorized data access or manipulation.
– Discovery: The flaw was identified by Erland Sommarskog.

2. CVE-2026-26127 | .NET Denial of Service Vulnerability

– Description: This issue stems from an out-of-bounds read condition in the .NET framework, which can be exploited by an unauthenticated attacker over a network to cause a denial of service.
– Impact: Successful exploitation could disrupt services and applications relying on the .NET framework, leading to potential downtime and service interruptions.
– Discovery: Reported by an anonymous researcher.

Critical Vulnerabilities Requiring Immediate Attention

In addition to the zero-day vulnerabilities, Microsoft has addressed several Critical-rated flaws that warrant prompt action:

1. CVE-2026-26113 | Microsoft Office Remote Code Execution Vulnerability

– Description: This vulnerability involves an untrusted pointer dereference in Microsoft Office, which can be exploited to execute arbitrary code in the context of the current user.
– Impact: An attacker could craft a malicious Office document that, when opened, allows them to execute code with the same privileges as the user, potentially leading to data theft or further system compromise.

2. CVE-2026-26110 | Microsoft Office Remote Code Execution Vulnerability

– Description: Similar to CVE-2026-26113, this flaw allows for remote code execution through the preview pane in Microsoft Office.
– Impact: Users could be compromised by merely viewing a malicious document in the preview pane, without fully opening it, making this a particularly insidious attack vector.

3. CVE-2026-26144 | Microsoft Excel Information Disclosure Vulnerability

– Description: This vulnerability in Microsoft Excel could allow attackers to access sensitive information.
– Impact: Exploitation could lead to unauthorized disclosure of confidential data, posing significant risks to data privacy and security.

Additional Notable Vulnerabilities

Beyond the Critical vulnerabilities, several Important-rated flaws have been addressed:

– Elevation of Privilege Vulnerabilities: These constitute the majority of the vulnerabilities patched this month. Notable examples include:
– CVE-2026-26132 | Windows Kernel Elevation of Privilege Vulnerability: Exploitation could allow attackers to gain higher-level privileges on the system.
– CVE-2026-25187 | Winlogon Elevation of Privilege Vulnerability: This flaw could enable attackers to escalate their privileges within the Windows operating system.

– Remote Code Execution Vulnerabilities: These vulnerabilities allow attackers to execute arbitrary code remotely. Examples include:
– CVE-2026-26114 | Microsoft SharePoint Server Remote Code Execution Vulnerability: Exploitation could lead to unauthorized code execution on SharePoint servers.
– CVE-2026-26111 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability: This flaw could allow remote attackers to execute code on affected systems.

Recommendations for Organizations and Users

Given the breadth and severity of the vulnerabilities addressed in this update, it is imperative for organizations and individual users to take the following actions:

1. Prioritize Patching Critical and Zero-Day Vulnerabilities: Focus on applying patches for the Critical vulnerabilities and the two publicly disclosed zero-days to mitigate the most significant risks.

2. Update All Affected Systems Promptly: Ensure that all systems running Windows, Office, SQL Server, Azure, and .NET are updated to the latest versions to protect against the vulnerabilities addressed in this release.

3. Review and Enhance Security Posture: Regularly assess security configurations and implement best practices to reduce the attack surface and improve overall security resilience.

4. Educate Users on Security Awareness: Provide training to users on recognizing phishing attempts and the importance of not opening or previewing suspicious documents, especially in light of vulnerabilities that can be exploited through the preview pane.

Conclusion

Microsoft’s March 2026 Patch Tuesday underscores the ongoing challenges in cybersecurity, with a significant number of vulnerabilities addressed, including two publicly disclosed zero-days. While there are no reports of active exploitation at this time, the potential risks associated with these vulnerabilities necessitate immediate and comprehensive patching efforts. Organizations and users must remain vigilant, promptly apply security updates, and adhere to best practices to safeguard their systems and data against emerging threats.