HomeSample Page

Sample Page Title


Microsoft Corp. in the present day pushed safety updates to repair at the very least 77 vulnerabilities in its Home windows working techniques and different software program. There aren’t any urgent “zero-day” flaws this month (in comparison with February’s 5 zero-day deal with), however as common some patches could deserve extra speedy consideration from organizations utilizing Home windows. Listed here are a number of highlights from this month’s Patch Tuesday.

Microsoft Patch Tuesday, March 2026 Version – Krebs on Safety

Picture: Shutterstock, @nwz.

Two of the bugs Microsoft patched in the present day have been publicly disclosed beforehand. CVE-2026-21262 is a weak spot that permits an attacker to raise their privileges on SQL Server 2016 and later editions.

“This isn’t simply any elevation of privilege vulnerability, both; the advisory notes that a certified attacker can elevate privileges to sysadmin over a community,” Rapid7’s Adam Barnett stated. “The CVSS v3 base rating of 8.8 is slightly below the edge for important severity, since low-level privileges are required. It will be a brave defender who shrugged and deferred the patches for this one.”

The opposite publicly disclosed flaw is CVE-2026-26127, a vulnerability in functions working on .NET. Barnett stated the rapid impression of exploitation is probably going restricted to denial of service by triggering a crash, with the potential for different kinds of assaults throughout a service reboot.

It will hardly be a correct Patch Tuesday with out at the very least one important Microsoft Workplace exploit, and this month doesn’t disappoint. CVE-2026-26113 and CVE-2026-26110 are each distant code execution flaws that may be triggered simply by viewing a booby-trapped message within the Preview Pane.

Satnam Narang at Tenable notes that simply over half (55%) of all Patch Tuesday CVEs this month are privilege escalation bugs, and of these, a half dozen have been rated “exploitation extra probably” — throughout Home windows Graphics Part, Home windows Accessibility Infrastructure, Home windows Kernel, Home windows SMB Server and Winlogon. These embody:

CVE-2026-24291: Incorrect permission assignments inside the Home windows Accessibility Infrastructure to succeed in SYSTEM (CVSS 7.8)
CVE-2026-24294: Improper authentication within the core SMB element (CVSS 7.8)
CVE-2026-24289: Excessive-severity reminiscence corruption and race situation flaw (CVSS 7.8)
CVE-2026-25187: Winlogon course of weak spot found by Google Venture Zero (CVSS 7.8).

Ben McCarthy, lead cyber safety engineer at Immersive, referred to as consideration to CVE-2026-21536, a important distant code execution bug in a element referred to as the Microsoft Units Pricing Program. Microsoft has already resolved the difficulty on their finish, and fixing it requires no motion on the a part of Home windows customers. However McCarthy says it’s notable as one of many first vulnerabilities recognized by an AI agent and formally acknowledged with a CVE attributed to the Home windows working system. It was found by XBOW, a totally autonomous AI penetration testing agent.

XBOW has persistently ranked at or close to the highest of the Hacker One bug bounty leaderboard for the previous yr. McCarthy stated CVE-2026-21536 demonstrates how AI brokers can establish important 9.8-rated vulnerabilities with out entry to supply code.

“Though Microsoft has already patched and mitigated the vulnerability, it highlights a shift towards AI-driven discovery of complicated vulnerabilities at growing pace,” McCarthy stated. “This growth suggests AI-assisted vulnerability analysis will play a rising position within the safety panorama.”

Microsoft earlier offered patches to handle 9 browser vulnerabilities, which aren’t included within the Patch Tuesday depend above. As well as, Microsoft issued a vital out-of-band (emergency) replace on March 2 for Home windows Server 2022 to handle a certificates renewal problem with passwordless authentication expertise Home windows Howdy for Enterprise.

Individually, Adobe shipped updates to repair 80 vulnerabilities — a few of them important in severity — in a wide range of merchandise, together with Acrobat and Adobe Commerce. Mozilla Firefox v. 148.0.2 resolves three excessive severity CVEs.

For a whole breakdown of all of the patches Microsoft launched in the present day, take a look at the SANS Web Storm Heart’s Patch Tuesday publish. Home windows enterprise admins who want to keep abreast of any information about problematic updates, AskWoody.com is all the time price a go to. Please be at liberty to drop a remark beneath when you expertise any points apply this month’s patches.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles