Microsoft’s March 2026 Patch Tuesday: Addressing 84 Vulnerabilities, Including Two Public Zero-Days
On March 10, 2026, Microsoft released its latest Patch Tuesday updates, addressing 84 security vulnerabilities across various software components. This comprehensive update includes fixes for two publicly disclosed zero-day vulnerabilities, underscoring the company’s commitment to enhancing cybersecurity.
Breakdown of the Vulnerabilities:
– Severity Levels:
– 8 vulnerabilities rated as Critical
– 76 vulnerabilities rated as Important
– Types of Vulnerabilities:
– 46 Elevation of Privilege
– 18 Remote Code Execution
– 10 Information Disclosure
– 4 Spoofing
– 4 Denial-of-Service
– 2 Security Feature Bypass
In addition to these, Microsoft has also addressed 10 vulnerabilities in its Chromium-based Edge browser since the February 2026 Patch Tuesday update.
Highlighted Vulnerabilities:
1. CVE-2026-26127 (CVSS score: 7.5): A denial-of-service vulnerability in the .NET framework.
2. CVE-2026-21262 (CVSS score: 8.8): An elevation of privilege vulnerability in SQL Server.
Both of these vulnerabilities were publicly disclosed prior to the release of the patches, emphasizing the importance of timely updates.
Critical Vulnerability:
– CVE-2026-21536 (CVSS score: 9.8): A remote code execution flaw in the Microsoft Devices Pricing Program. Microsoft has stated that this vulnerability has been fully mitigated, requiring no action from users. The AI-powered vulnerability discovery platform XBOW is credited with identifying this issue.
Expert Insights:
Satnam Narang, a senior staff research engineer at Tenable, highlighted that over half (55%) of the vulnerabilities addressed this month are related to privilege escalation. He noted that such vulnerabilities are often exploited by threat actors during post-compromise activities, following initial access through methods like social engineering or exploitation of other vulnerabilities.
Specific Vulnerabilities of Interest:
– Winlogon Privilege Escalation Flaw (CVE-2026-25187, CVSS score: 7.8): This vulnerability allows a locally authenticated attacker with low privileges to exploit a link-following condition in the Winlogon process, escalating to SYSTEM privileges. Google Project Zero researcher James Forshaw reported this issue. Jacob Ashdown, a cybersecurity engineer at Immersive, emphasized that the flaw requires no user interaction and has low attack complexity, making it a straightforward target once an attacker gains a foothold.
– Azure Model Context Protocol (MCP) Server Vulnerability (CVE-2026-26118, CVSS score: 8.8): This server-side request forgery bug could allow an authorized attacker to elevate privileges over a network. By sending specially crafted input to an MCP Server tool that accepts user-provided parameters, an attacker can manipulate the server to send an outbound request to a malicious URL, potentially capturing the server’s managed identity token without requiring administrative access. This could grant the attacker access to resources authorized to the managed identity.
Information Disclosure Concern:
– Excel Information Disclosure Flaw (CVE-2026-26144, CVSS score: 7.5): This cross-site scripting vulnerability arises from improper neutralization of input during web page generation. Exploitation could lead to data exfiltration via Copilot Agent mode in a zero-click attack. Alex Vovk, CEO and co-founder of Action1, highlighted the danger of such vulnerabilities in corporate environments, where Excel files often contain sensitive data. He warned that attackers could silently extract confidential information without triggering obvious alerts, especially in organizations using AI-assisted productivity features.
Microsoft’s Response:
In addition to these patches, Microsoft announced a change in the default behavior of Windows Autopatch. Starting with the May 2026 Windows security update, hotpatch security updates will be enabled by default. This change aims to secure devices more rapidly by applying security fixes without waiting for a restart, potentially achieving 90% compliance in half the time, while still allowing organizations to maintain control.
Conclusion:
Microsoft’s March 2026 Patch Tuesday underscores the company’s proactive approach to cybersecurity, addressing a wide range of vulnerabilities, including publicly disclosed zero-days. Organizations and individual users are strongly encouraged to apply these updates promptly to mitigate potential security risks.