CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership

Microsoft Patches 83 CVEs in March Update

Dark Reading Archived Mar 16, 2026 ✓ Full text saved

For a change, there's little in this month's Patch Tuesday that should cause panic, according to security experts.

Full text archived locally
✦ AI Summary · Claude Sonnet


    APPLICATION SECURITY VULNERABILITIES & THREATS CYBER RISK ENDPOINT SECURITY NEWS Microsoft Patches 83 CVEs in March Update For a change, there's little in this month's Patch Tuesday that should cause panic, according to security experts. Jai Vijayan,Contributing Writer March 10, 2026 4 Min Read SOURCE: JANEWS VIA SHUTTERSTOCK Microsoft this week released patches for 83 CVEs across its product range, six of which it expects attackers are more like to exploit for a variety of reasons. The patch drop is larger than last month's relatively light 63-patch security update and contains the usual mix of privilege escalation vulnerabilities, remote code execution (RCE) flaws, denial of service issues, vulnerabilities that enable data theft and other bugs. However, there's little in the set that merits an immediate all-hands-on-deck kind of response that some Microsoft updates warrant, according to security experts.  For the most part, Microsoft's March patch release should pose relatively fewer challenges than usual, observed Tyler Reguly, associate director of security R&D at Fortra. "I don't see a lot of reasons for people to stress," Reguly said in statement to Dark Reading. The only vulnerability to which Microsoft assigned a near maximum severity score has already been fixed and requires no user action.  Related:GlassWorm Malware Evolves to Hide in Dependencies "The messaging this month should be, 'Apply your patches after you finish your testing cycles,'" he said. "There's nothing that requires rushing patches, nothing that requires panic … this is just a nice, quiet Patch Tuesday." A Relatively Light Month Microsoft assigned a CVSS severity score of more than 9 out of a 10 to just one vulnerability in this month's set — CVE-2027-21536 (CVSS 9.8), an RCE vulnerability related to Microsoft Devices Pricing Program for channel partners and distributors.  Ben McCarthy, lead cyber security engineer at Immersive, described the flaw as notable for being one of the first known vulnerabilities that an AI agent identified and that has an official CVE. "Although Microsoft has already patched and mitigated the vulnerability, it highlights a shift toward AI-driven discovery of complex vulnerabilities at increasing speed," he said in an emailed comment. Eight of the flaws disclosed this week have a severity rating of critical. Two others were publicly known prior to this week's patch update: CVE-2026-26127 (CVSS 7.5), a .NET denial of service vulnerability, and CVE-2026-21262 (CVSS 8.8), a SQL Server elevation of privilege flaw. Both bugs are technically zero-day flaws, but neither pose much of a threat, according to Satnam Narang, senior staff research engineer at Tenable. "Their public disclosure prior to today is the only novel trait," he said in a statement. "These bugs are more bark than bite. The DoS vulnerability is assessed as unlikely to be exploited and requires an attacker to be authorized beforehand, while the privilege escalation bug was deemed less likely to be exploited." Related:Real-Time Banking Trojan Strikes Brazil's Pix Users EoP Bugs Rule Elevation of privilege (EoP) bugs handily beat out all other vulnerability categories in Microsoft's Patch Tuesday this month and accounted for some 55.4% of the patched CVEs by Tenable's count. RCE vulnerabilities, which are often — and not always correctly — assumed more dangerous than EoP vulnerabilities, clocked in at 20.5%.  Among the EoP vulnerabilities that security vendors highlighted were three affecting the Windows kernel: CVE-2026-24289 (CVSS 7.8), CVE-2026-26132 (CVSS 7.8), and CVE-2026-24287 (CVSS 7.8). Of these, Microsoft assessed CVE-2026-24289 and CVE-2026-26132 as flaws that attackers would more likely exploit because they involve low attack complexity, no special privileges, and no user interaction. Amol Sarwate, head of security research at Cohesity, recommended that administrators also pay attention to two other EoP vulnerabilities, because attackers will more likely attempt to exploit them: CVE-2026-24294 (CVSS 7.8) in SMB Server, and CVE-2026-23668 (CVSS 7.0) in Microsoft Graphics Component. "Elevation of privilege is one of the attackers' primary methods for gaining access to networks and maintaining dwell time," Sarwate said in emailed comments. Related:Xygeni GitHub Action Compromised Via Tag Poison RCE Bugs Worth Noting The RCE vulnerabilities that security experts pointed to as more noteworthy in this month's set are two affecting Microsoft Office: CVE-2026-26113 (CVSS 8.4) and CVE-2026-26110 (CVSS 8.4). The Preview Pane is an attack vector in both cases, meaning a user could be compromised without having to open a malcious document or file.  "If the security update cannot be applied immediately, organizations should disable the Preview Pane in file explorers and restrict the opening of Office files from untrusted sources," advised Jack Bicer, director of vulnerability research at Action1, in a statement. "Implementing email filtering, attachment scanning, and endpoint protection monitoring can also reduce the risk of malicious document delivery." CVE-2026-25190 (CVS 7.8), an RCE vulnerability in GDI; and CVE-2026-25181 (CVSS 7.5), an information disclosure vulnerability in GDI+, the graphics APIs in Windows, are two vulnerabilities in Microsoft's less-likely-to-be-exploited list this month. But when chained, the two flaws enable a dual-stage attack that a bad actor could use to bypass a Windows security feature and execute arbitrary code. However, pulling off such an attack would take some doing, according to Ryan Braunstein, security manager at Automox.  "The precision required to pull this off suggests nation-state-level investment," he said in an emailed comment, "but the payoff matches: clean, reliable remote code execution on the target system." About the Author Jai Vijayan Contributing Writer Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, Ill. More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Cybersecurity Forecast 2026 The ROI of AI in Security ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars You May Also Like APPLICATION SECURITY Microsoft & Anthropic MCP Servers at Risk of RCE, Cloud Takeovers by Nate Nelson, Contributing Writer JAN 20, 2026 APPLICATION SECURITY Microsoft Fixes Exploited Zero Day in Light Patch Tuesday by Jai Vijayan, Contributing Writer DEC 09, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 APPLICATION SECURITY 10 Bugs Found in Perplexity AI's Chatbot Android App by Nate Nelson, Contributing Writer APR 11, 2025 Editor's Choice CYBERSECURITY OPERATIONS Why Stryker's Outage Is a Disaster Recovery Wake-Up Call byJai Vijayan MAR 12, 2026 5 MIN READ THREAT INTELLIGENCE Commercial Spyware Opponents Fear US Policy Shifting byRob Wright MAR 12, 2026 9 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST AI-Powered Threat Detection: Beyond Traditional Security Models WED, MARCH 25, 2026 AT 1PM EST More Webinars White Papers Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗