March 2026 Patch Tuesday: Microsoft Fixes 77 Vulnerabilities – KrebsonSecurity

by Priyanka Patel

Microsoft delivered its regularly scheduled security updates today, addressing a total of 77 vulnerabilities across its Windows operating systems and related software. While this month’s “Patch Tuesday” doesn’t include any actively exploited “zero-day” flaws – a welcome change from February’s five – several of the addressed issues warrant prompt attention, particularly for organizations relying on SQL Server and those using Microsoft Office applications. The updates underscore the ongoing and relentless effort to secure the digital landscape against evolving threats, a task increasingly aided by artificial intelligence.

The sheer volume of patches released each month highlights the complexity of modern software and the constant search for weaknesses. Security professionals routinely prioritize updates based on severity and potential impact, and this month is no exception. Several vulnerabilities have been publicly disclosed, meaning attackers may already be aware of them and actively developing exploits. Addressing these quickly is crucial to minimizing risk. The focus for many IT departments will be on vulnerabilities that could allow attackers to gain elevated privileges within a system, potentially granting them broad control.

Among the most pressing issues is CVE-2026-21262, a privilege escalation vulnerability affecting SQL Server 2016 and later versions. According to Rapid7’s Adam Barnett, this flaw allows an attacker to elevate their privileges to “sysadmin” level over a network. “The CVSS v3 base score of 8.8 is just below the threshold for critical severity, since low-level privileges are required,” Barnett explained, adding that deferring these patches would be a significant risk. Another publicly disclosed vulnerability, CVE-2026-26127, impacts applications running on the .NET framework and could lead to denial-of-service attacks, with the potential for further exploitation during a service reboot.

Image: Shutterstock, @nwz.

Critical Office Flaws and Widespread Privilege Escalation

Microsoft Office users also face potential risks this month, with CVE-2026-26113 and CVE-2026-26110 identified as remote code execution vulnerabilities. These flaws are particularly concerning because they can be triggered simply by viewing a malicious message in the Preview Pane, meaning users don’t even need to open the attachment to be compromised. This highlights the importance of exercising caution when handling emails from unknown senders.

A significant portion of this month’s updates – 55% of the CVEs – address privilege escalation bugs. Satnam Narang at Tenable noted that six of these vulnerabilities are considered “exploitation more likely,” affecting core Windows components like the Graphics Component, Accessibility Infrastructure, Kernel, SMB Server, and Winlogon. These include:

  • CVE-2026-24291: Incorrect permission assignments within the Windows Accessibility Infrastructure (CVSS 7.8)
  • CVE-2026-24294: Improper authentication in the core SMB component (CVSS 7.8)
  • CVE-2026-24289: High-severity memory corruption and race condition flaw (CVSS 7.8)
  • CVE-2026-25187: Winlogon process weakness discovered by Google Project Zero (CVSS 7.8)

The Rise of AI in Vulnerability Discovery

Perhaps the most intriguing development this month is the identification of CVE-2026-21536, a critical remote code execution bug in the Microsoft Devices Pricing Program, by XBOW, a fully autonomous AI penetration testing agent. Ben McCarthy, lead cyber security engineer at Immersive, highlighted that Microsoft had already resolved the issue, requiring no action from Windows users. However, the significance lies in the fact that this is one of the first vulnerabilities officially attributed to an AI agent. XBOW has consistently performed well on the Hacker One bug bounty leaderboard, demonstrating its effectiveness in identifying security flaws without access to source code.

“Although Microsoft has already patched and mitigated the vulnerability, it highlights a shift toward AI-driven discovery of complex vulnerabilities at increasing speed,” McCarthy said. “This development suggests AI-assisted vulnerability research will play a growing role in the security landscape.” This trend suggests that security teams will increasingly rely on AI tools to proactively identify and address vulnerabilities before they can be exploited by malicious actors.

Beyond Microsoft: Adobe and Firefox Updates

The need for vigilance extends beyond Microsoft products. Adobe released updates addressing 80 vulnerabilities – some critical – in a range of products, including Acrobat and Adobe Commerce. Adobe’s security bulletin provides a comprehensive list of the addressed issues. Mozilla Firefox also received an update, version 148.0.2, resolving three high-severity CVEs. Keeping all software up to date is a fundamental security practice.

Microsoft also issued an out-of-band update on March 2 for Windows Server 2022 to address a certificate renewal issue affecting Windows Hello for Business, the company’s passwordless authentication technology. This demonstrates Microsoft’s commitment to addressing critical issues as they arise, even outside of the regular Patch Tuesday schedule.

For those seeking a more detailed breakdown of all the patches released this month, the SANS Internet Storm Center’s Patch Tuesday post offers a comprehensive analysis. Administrators looking for information on potentially problematic updates can also consult AskWoody.com, a community-driven resource for Windows security news.

Looking ahead, Microsoft is expected to continue releasing security updates on a monthly basis, and the role of AI in vulnerability discovery is only likely to grow. The ongoing arms race between security researchers and attackers demands constant vigilance and a proactive approach to security. The next Patch Tuesday is scheduled for April 9, 2026, and will likely bring another wave of updates addressing newly discovered vulnerabilities.

Please share your experiences with these updates in the comments below, and feel free to share this article with your network to help spread awareness of these important security measures.

You may also like

Leave a Comment