{"id":226,"date":"2026-03-11T10:05:37","date_gmt":"2026-03-11T10:05:37","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=226"},"modified":"2026-03-11T10:05:37","modified_gmt":"2026-03-11T10:05:37","slug":"microsoft-patches-84-flaws-in-march-patch-tuesday-including-two-public-zero-days","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=226","title":{"rendered":"Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEipDVdeJebBFVnXLhsh2P4nBqmuh4R-UtLH7ZFvyw1W95zBU4YX4GF6I1WZ7g3ALEq596lEFr6q8iuGZ_PG2D12h67cLuNhCnSplkg_kDNbKyvTJnByhz2WAeAL9YHXCpJp0D3UOnhuydFZ6-jfXi6DLx5upod8egCtZ2lZhmbUzIprEusPyz0efzBMFzFI\/s1700-e365\/windows-patch.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Microsoft on Tuesday released patches for a set of <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2026-mar\" rel=\"noopener\" target=\"_blank\">84 new security vulnerabilities<\/a> affecting various software components, including two that have been listed as publicly known.<\/p>\n<p>Of these, eight are rated Critical, and 76 are rated Important in severity. Forty-six of the patched vulnerabilities relate to privilege escalation, followed by 18 remote code execution, 10 information disclosure, four spoofing, four denial-of-service, and two security feature bypass flaws.<\/p>\n<p>The fixes are in addition to <a href=\"https:\/\/learn.microsoft.com\/en-us\/deployedge\/microsoft-edge-relnotes-security\" rel=\"noopener\" target=\"_blank\">10 vulnerabilities<\/a> that have been addressed in its Chromium-based Edge browser since the release of the February 2026 Patch Tuesday update.<\/p>\n<p>The two publicly disclosed zero-days are <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-26127\" rel=\"noopener\" target=\"_blank\">CVE-2026-26127<\/a> (CVSS score: 7.5), a denial-of-service vulnerability in .NET, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-21262\" rel=\"noopener\" target=\"_blank\">CVE-2026-21262<\/a> (CVSS score: 8.8), an elevation of privilege vulnerability in SQL Server.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/not-fast-enough-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhlXM830ruQd2xT6M7JNeNRjaFa1onD12WjSCHihTFMTzbyfT9h-irPmXy_h3E1HGSs6sdv7FTmnyNVTM5kmSb7BuUtZe8gKoTQt99P1sSzRcqqXpOJP6eoAOhR3DGb6qHx9kOZ_HBZUMmVnsnd0DM7QfUp81bgzTvvgLww6oqB-EhnDfWXH5pWCYhAsyLs\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The vulnerability with the highest CVSS score in this month&#8217;s update is a critical remote code execution flaw in the Microsoft Devices Pricing Program. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-21536\" rel=\"noopener\" target=\"_blank\">CVE-2026-21536<\/a> (CVSS score: 9.8), per Microsoft, has been fully mitigated, and no action is required from users. Artificial intelligence (AI)-powered autonomous vulnerability discovery platform XBOW has been credited with discovering and reporting the issue.<\/p>\n<p>\u00abThis month, over half (55%) of all Patch Tuesday CVEs were privilege escalation bugs, and of those, six were rated exploitation more likely across Windows Graphics Component, Windows Accessibility Infrastructure, Windows Kernel, Windows SMB Server, and Winlogon,\u00bb Satnam Narang, senior staff research engineer at Tenable, said.<\/p>\n<p>\u00abWe know these bugs are typically used by threat actors as part of post-compromise activity, once they get onto systems through other means (social engineering, exploitation of another vulnerability).\u00bb<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>The Winlogon privilege escalation flaw (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-25187\" rel=\"noopener\" target=\"_blank\">CVE-2026-25187<\/a>, CVSS score: 7.8), in particular, leverages improper link resolution to obtain SYSTEM privileges. Google Project Zero researcher James Forshaw has been acknowledged for reporting the vulnerability.<\/p>\n<p>\u00abThe flaw allows a locally authenticated attacker with low privileges to exploit a link-following condition in the Winlogon process and escalate to SYSTEM privileges,\u00bb Jacob Ashdown, cybersecurity engineer at Immersive, said. \u00abThe vulnerability requires no user interaction and has low attack complexity, making it a straightforward target once an attacker gains a foothold.\u00bb<\/p>\n<p>Another vulnerability of note is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-26118\" rel=\"noopener\" target=\"_blank\">CVE-2026-26118<\/a> (CVSS score: 8.8), a server-side request forgery bug in the Azure Model Context Protocol (MCP) server that could allow an authorized attacker to elevate privileges over a network.<\/p>\n<p>\u00abAn attacker could exploit this issue by sending specially crafted input to an Azure Model Context Protocol (MCP) Server tool that accepts user\u2011provided parameters,\u00bb Microsoft said.<\/p>\n<p>\u00abIf the attacker can interact with the MCP\u2011backed agent, they can submit a malicious URL in place of a normal Azure resource identifier. The MCP Server then sends an outbound request to that URL and, in doing so, may include its managed identity token. This allows the attacker to capture that token without requiring administrative access.\u00bb<\/p>\n<p>Successful exploitation of the vulnerability could permit an attacker to obtain the permissions associated with the MCP Server&#8217;s managed identity. The attacker could then leverage this behavior to access or perform actions on any resources that the managed identity is authorized to reach.<\/p>\n<p>Among the Critical-severity bugs resolved by Microsoft is an information disclosure flaw in Excel. Tracked as <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2026-26144\" rel=\"noopener\" target=\"_blank\">CVE-2026-26144<\/a> (CVSS score of 7.5), it has been described as a case of cross-site scripting that occurs as a result of improper neutralization of input during web page generation.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fs-report-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWQgUDT06NQu9vGMPC7BWROmJABTIWg058l7oGKD-v3ZchC8_66xjbclOE9koChsRf5CEKgqrXTVrne_00PdGokh3brhvF-g33I4FYYpTukrvuNQWXZOVAfon6-2axyRoVJ4uOrXPqRhxfZUaJWEm-K9esUS3ql8VSVWAKLqyfhHLgMSXhkMTkcOtGSX7R\/s728-e100\/fs-report-d.png\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The Windows maker said an attacker who exploited the shortcoming could potentially cause Copilot Agent mode to exfiltrate data as part of a zero-click attack.<\/p>\n<p>\u00abInformation disclosure vulnerabilities are especially dangerous in corporate environments where Excel files often contain financial data, intellectual property, or operational records,\u00bb Alex Vovk, CEO and co-founder of Action1, said in a statement.<\/p>\n<p>\u00abIf exploited, attackers could silently extract confidential information from internal systems without triggering obvious alerts. Organizations using AI-assisted productivity features may face increased exposure, as automated agents could unintentionally transmit sensitive data outside corporate boundaries.\u00bb<\/p>\n<p>The patches come as Microsoft said it&#8217;s changing the default behavior of Windows Autopatch by enabling hotpatch security updates to help secure devices at a faster pace.<\/p>\n<p>\u00abThis change in default behavior comes to all eligible devices in Microsoft Intune and those accessing the service via Microsoft Graph API starting with the May 2026 Windows security update,\u00bb Redmond <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/windows-itpro-blog\/securing-devices-faster-with-hotpatch-updates-on-by-default\/4500066\" rel=\"noopener\" target=\"_blank\">said<\/a>. \u00abApplying security fixes without waiting for a restart can get organizations to 90% compliance in half the time, while you remain in control.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that have been listed as publicly known. Of these, eight are&hellip;<\/p>\n","protected":false},"author":1,"featured_media":227,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[11,584,583,147,348,57,328,349,53],"class_list":["post-226","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-flaws","tag-including","tag-march","tag-microsoft","tag-patch","tag-patches","tag-public","tag-tuesday","tag-zerodays"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=226"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/226\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/227"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}