Stay ahead of critical vulnerabilities: Our breakdown of March 2026 Microsoft security patches.
Microsoft's March 2026 Patch Tuesday addresses 79 security vulnerabilities, including 2 publicly disclosed zero-days and 3 Critical-severity flaws. While no vulnerabilities have been confirmed as actively exploited at time of release, the public disclosure of two zero-days (a SQL Server elevation-of-privilege bug, CVE-2026-21262, and a .NET denial-of-service flaw, CVE-2026-26127) means exploit details are already in the public domain, significantly shortening the safe patching window.
The most urgent concern this month is CVE-2026-26144, a Critical information disclosure vulnerability in Microsoft Excel that can cause Copilot Agent mode to silently exfiltrate data with no user interaction required. Organisations that have deployed Microsoft 365 Copilot should treat this as an immediate priority. Two additional Critical-rated Office remote code execution flaws (CVE-2026-26113 and CVE-2026-26110) are exploitable via the preview pane, making them prime candidates for phishing-based attacks.
Key actions for security and IT teams:
This release follows February 2026's exceptionally severe Patch Tuesday, which included six actively exploited zero-days. March offers a slightly more manageable window, but demands equally swift action on its highest-severity items.
Microsoft's March 2026 Patch Tuesday has arrived, addressing 79 security vulnerabilities across Windows, Microsoft Office, SQL Server, Azure, .NET, and more. This month's release includes two publicly disclosed zero-day vulnerabilities and three Critical-severity flaws, two of which are remote code execution bugs in Microsoft Office and one is a notable information disclosure flaw in Excel with serious Copilot-related implications.
While neither zero-day has been confirmed as actively exploited in the wild at time of release, their public disclosure means exploit details are already available, making rapid patching an urgent priority for all organisations.
Note: This count covers vulnerabilities patched directly on Patch Tuesday. It excludes 9 Microsoft Edge flaws, Mariner, Payment Orchestrator Service, Azure, and Microsoft Devices Pricing Program issues fixed earlier in the month.
| Category | Count |
|---|---|
| Total Vulnerabilities | 79 |
| Critical | 3 |
| Important | 75 |
| Zero-Days (Publicly Disclosed) | 2 |
| Actively Exploited | 0 confirmed |
Vulnerability Types:
This month's two zero-days were publicly disclosed before official patches were available. Although neither has been confirmed as exploited in active attacks, public disclosure significantly lowers the barrier for threat actors looking to weaponise the flaws.
Microsoft has patched a publicly disclosed SQL Server elevation-of-privilege flaw that grants SQLAdmin privileges. Improper access control in SQL Server allows an authorised attacker to elevate privileges over a network. The flaw was discovered by Erland Sommarskog, a well-known SQL Server expert and Microsoft MVP.
Microsoft has patched a publicly disclosed .NET denial of service vulnerability. An out-of-bounds read in .NET allows an unauthorised attacker to deny service over a network. This flaw was attributed to an anonymous researcher.
Three vulnerabilities carry Microsoft's Critical severity rating this month.
Both flaws affect Microsoft Office and can be exploited via the preview pane, meaning a user does not need to fully open a document for exploitation to occur. An attacker who successfully exploits either flaw could execute arbitrary code in the context of the current user.
This is arguably the most novel vulnerability in this month's release. Although classified as an information disclosure flaw, it carries Critical severity due to its potential to weaponise Microsoft Copilot as a data exfiltration channel.
An attacker who successfully exploits this vulnerability could potentially cause Copilot Agent mode to exfiltrate data via unintended network egress, enabling a zero-click information disclosure attack where sensitive data could be silently leaked without any user interaction beyond having Copilot enabled.
EoP flaws again represent the largest category this month, targeting high-value Windows components:
| CVE | Product | Severity | Notes |
|---|---|---|---|
| CVE-2026-21262 | SQL Server | Important | Zero-day; grants SQLAdmin privileges over network |
| CVE-2026-26132 | Windows Kernel | Important | Kernel-level privilege escalation |
| CVE-2026-26128 | Windows SMB Server | Important | SMB is a common lateral movement pathway |
| CVE-2026-25187 | Winlogon | Important | Affects Windows logon process |
| CVE-2026-25189 | Windows DWM Core Library | Important | Third consecutive month with DWM EoP |
| CVE-2026-26148 | Azure AD SSH Login (Linux) | Important | Targets Linux via Azure AD SSH extension |
| CVE-2026-26131 | .NET | Important | Elevation via .NET runtime |
| CVE-2026-26116 | SQL Server | Important | SQL Server privilege escalation |
| CVE-2026-26115 | SQL Server | Important | SQL Server privilege escalation |
| CVE-2026-25188 | Windows Telephony Service | Important | Windows Telephony Service vulnerability |
| CVE | Product | Severity | Notes |
|---|---|---|---|
| CVE-2026-26113 | Microsoft Office | Critical | Preview-pane exploitable |
| CVE-2026-26110 | Microsoft Office | Critical | Preview-pane exploitable |
| CVE-2026-26114 | SharePoint Server | Important | High-value internal target |
| CVE-2026-26106 | SharePoint Server | Important | Second SharePoint RCE this cycle |
| CVE-2026-26112 | Microsoft Excel | Important | Excel RCE |
| CVE-2026-26109 | Microsoft Excel | Important | Excel RCE |
| CVE-2026-26108 | Microsoft Excel | Important | Excel RCE |
| CVE-2026-26107 | Microsoft Excel | Important | Excel RCE |
| CVE-2026-26111 | Windows RRAS | Important | Routing and Remote Access Service |
| CVE-2026-25190 | Windows GDI | Important | GDI graphics component |
| CVE | Product | Severity | Notes |
|---|---|---|---|
| CVE-2026-26144 | Microsoft Excel / Copilot | Critical | Zero-click Copilot data exfiltration |
| CVE-2026-26123 | Microsoft Authenticator | Important | Authenticator app information disclosure |
| CVE-2026-25186 | Windows Accessibility | Important | Windows Accessibility Infrastructure flaw |
| CVE | Product | Severity | Notes |
|---|---|---|---|
| CVE-2026-26127 | .NET | Important | Zero-day; unauthenticated network Denial of Service (DoS) |
| CVE-2026-26130 | ASP.NET Core | Important | ASP.NET Core service disruption |
| CVE | Product | Severity | Notes |
|---|---|---|---|
| CVE-2026-26141 | Azure Arc Hybrid Worker | Important | Arc-enabled Windows VM extension |
| CVE-2026-26117 | Azure Connected Machine Agent | Important | Connected Machine Agent EoP |
| CVE-2026-26118 | Azure MCP Server Tools | Important | Azure MCP Server EoP |
| CVE-2026-26121 | Azure IoT Explorer | Important | Spoofing vulnerability |
| CVE-2026-26148 | Azure AD SSH Login | Important | Linux-targeting EoP via SSH extension |
March 2026 is a busy month for security updates beyond Microsoft. Security teams should also review and apply patches from the following vendors:
March continues a heavy start to the year for Microsoft security patching:
| Month | Total CVEs | Zero-Days | Actively Exploited |
|---|---|---|---|
| January 2026 | 114 | 3 | 1 |
| February 2026 | 58 | 9 | 6 |
| March 2026 | 79 | 2 (disclosed) | 0 confirmed |
February 2026 was one of the most critical Patch Tuesday releases in recent history, with six actively exploited zero-days covering Windows Shell, MSHTML, Microsoft Word, Desktop Window Manager, Windows Remote Desktop Services, and Windows Remote Access Connection Manager. Organisations that are still catching up on February deployments should treat March as a compounding urgency.
March 2026 continues the deployment of updated Secure Boot certificates, which Microsoft began rolling out with February's Patch Tuesday. The original Secure Boot certificates issued in 2011 begin expiring in late June 2026. Devices that have not received the newer 2023 certificates will still start and operate normally after expiration, but will no longer be able to receive new security protections for the early boot process.
Action required: Organisations should ensure all Windows endpoints have received and successfully applied Secure Boot certificate updates from both February and March 2026 cumulative updates ahead of the June 2026 deadline.
| Operating System | KB Article |
|---|---|
| Windows 11 24H2 | KB5079473 |
| Windows 11 23H2 | KB5078883 |
| Windows 10 (ESU) | KB5078885 |
March 2026 Patch Tuesday is a significant but manageable release. The absence of actively exploited zero-days provides a slightly more comfortable patching window compared to February's crisis-level release, but the public disclosure of two zero-days and the novel Copilot exfiltration risk in CVE-2026-26144 demand urgent attention.
Security and IT teams should:
Sources: BleepingComputer, Cyber Security News, Microsoft Security Response Center