Skip to Content

March Patch Tuesday visits 15 product families

Eight Critical-severity bugs – none in Windows – appear in 84-CVE haul
Author placeholder

Microsoft on Tuesday released 84 patches affecting 15 product families – including a few you’ve possibly never encountered. Eight of the addressed issues are considered by Microsoft to be of Critical severity, though none of those affect Windows, nor are they expected to be exploited within the next 30 days. In addition, five of those Critical issues were in fact addressed by Microsoft in advance of Patch Tuesday itself, as we’ll discuss below. Twenty-two have a CVSS base score of 8.0 or higher, including one with a 9.8 base score. None are known to be under active exploit in the wild, but two are publicly disclosed so far.

At patch time, six CVEs are judged more likely to be exploited in the next 30 days by the company’s estimation. Various of this month’s issues are amenable to direct detection by Sophos protections, and we include information on those in the usual table below.

We are as always including at the end of this post appendices listing all Microsoft’s patches sorted by severity (Appendix A), by predicted exploitability timeline and CVSS Base score (Appendix B), and by product family (Appendix C). Appendix D lists ten Edge CVEs addressed this month, as well as three Adobe CVEs and one Critical-severity issue affecting Windows Sematic Kernel and expressed via GitHub. Appendix E provides a breakout of the 45 CVEs affecting various versions of Windows Server.

By the numbers

  • Total CVEs: 84
  • Publicly disclosed: 2
  • Exploit detected: 0
  • Severity
    • Critical: 8
    • Important: 76
  • Impact:
    • Denial of Service: 4
    • Elevation of Privilege: 46
    • Information Disclosure: 10
    • Remote Code Execution: 17
    • Security Feature Bypass: 3
    • Spoofing: 4
  • CVSS base score 9.0 or greater: 1
  • CVSS base score 8.0 or greater: 22

A bar chart showing the March 2026 Patch Tuesday CVEs sorted by impact, then further sorted by severity; material is covered in text
Figure 1: Elevation of Privilege issues once again lead the month by volume, though just three of those are Critical-severity

Products

As is our custom for this list, CVEs that apply to more than one product family are counted once for each family they affect. We note, by the way, that CVE names don’t always reflect affected product families closely. In particular, some CVEs names in the Office family may mention products that don’t appear in the list of products affected by the CVE, and vice versa.

A bar chart showing the March 2026 Patch Tuesday CVEs sorted by product family, then further sorted by severity; material is covered in text
Figure 2: Windows bugs make up just over half the total number for March, but there’s a variety of relatively obscure product families affected by this month’s patches. The Microsoft Devices Pricing Program, familiar to Microsoft’s channel partners in particular, is discussed and the issue described here. The Payment Orchestrator Service platform and the issue patched are discussed here. Both are among the five Critical-severity bugs patched by Microsoft in advance of Patch Tuesday.

A bar chart showing the cumulative CVE count for 2026 to date, excluding out-of-band releases. The CVEs are sorted by impact and further sorted by severity. EoP CVEs lead the count, followed by RCE, information disclosure, spoofing, security feature bypass, denial of service, and tampering
Figure 3: A quarter of the way through 2026, Elevation of Privilege issues constitute half of the 255 CVEs covered by Patch Tuesdays so far this year. Just 21 of the CVEs addressed in the normal course of patching have been of Critical severity

Notable March updates

In addition to the issues discussed above, a number of specific items merit attention.

CVE-2026-26110 -- Microsoft Office Remote Code Execution Vulnerability
CVE-2026-26113 -- Microsoft Office Remote Code Execution Vulnerability
CVE-2026-26144 -- Microsoft Excel Information Disclosure Vulnerability

As mentioned above, five of the eight Critical-severity CVEs patched this month were in fact handled before Patch Tuesday, with Microsoft simply providing information on those in the interests of transparency. These three, on the other hand, were not. The first two both list preview pane as a vector; both affect 365 and Office, and SharePoint is also listed for CVE-2026-26113. The remaining CVE, meanwhile, affects 365 but not Office (nor, according to Microsoft’s information, Excel specifically). According to Microsoft, an attacker who successfully exploited this vulnerability could potentially cause Copilot Agent mode to exfiltrate data via unintended network egress, enabling zero-click information disclosure attacks.

CVE-2026-23660 -- Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability

This Important-severity EoP requires some fairly specific administrator interaction, as there is no direct download link. Microsoft says, “Customers need to open the Extensions + Applications blade for their virtual machine in the Azure Portal and search for the extension named AdminCenter (Microsoft.AdminCenter.AdminCenter). From there, they can add or update the extension following the standard Azure VM extension installation process described here.”

CVE-2026-26123 -- Microsoft Authenticator Information Disclosure Vulnerability

This Important-severity information-disclosure issue requires some fairly specific user interaction. According to Microsoft, “the user must have a malicious application installed on their device and then accidentally select that application as the handler for the sign‑in deep link. This can occur when the user scans a QR code or taps a sign‑in link and chooses the malicious app instead of Microsoft Authenticator, causing the sign‑in flow to be handled by the attacker‑controlled app.” The issue affects both Android and iOS.

CVE-2026-24288 -- Windows Mobile Broadband Driver Remote Code Execution Vulnerability

The attack surface for this Important-severity RCE is a little perplexing – “triggered by physically connecting or manipulating hardware that interacts with the affected system” – until you notice that the finder, Nicolas Delhaye, is with aerospace titan Airbus. So… did you plug your phone into the seatback charger on your last flight?

CVE-2026-21262 – SQL Server Elevation of Privilege Vulnerability

This Important-severity bug, one of two that has already been publicly disclosed, came to Microsoft through one of the longest-tenured members of one of the longest-tenured outreach programs at the Redmond company. Erland Sommarskog with Erland Sommarskog SQL-Konsult AB, who has been a Microsoft MVP for twenty-five years, scores a finder credit for this one.

Sophos protections

CVESophos Intercept X/Endpoint IPSSophos XGS Firewall
CVE-2026-24289Exp/2624289-AExp/2624289-A
CVE-2026-24291Exp/2624291-AExp/2624291-A
CVE-2026-25187Exp/2625187-AExp/2625187-A
CVE-2026-26132Exp/2626132-AExp/2626132-A

As you can every month, if you don’t want to wait for your system to pull down Microsoft’s updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows you’re running, then download the Cumulative Update package for your specific system’s architecture and build number.

Appendix A: Vulnerability Impact and Severity

This is a list of March patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE.

Elevation of Privilege (46 CVEs)

Critical severity
CVE-2026-23651Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
CVE-2026-26124Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
CVE-2026-26125Payment Orchestrator Service Elevation of Privilege Vulnerability
Important severity
CVE-2026-23651System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability
CVE-2026-26124SQL Server Elevation of Privilege Vulnerability
CVE-2026-26125Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
CVE-2026-20967Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability
CVE-2026-21262Broadcast DVR Elevation of Privilege Vulnerability
CVE-2026-23660Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-23665Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability
CVE-2026-23667Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability
CVE-2026-23668Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVE-2026-23671Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability
CVE-2026-23672Win32k Elevation of Privilege Vulnerability
CVE-2026-23673Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-24283Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-24285Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-24287Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability
CVE-2026-24289Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-24290Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-24291Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-24292Windows Device Association Service Elevation of Privilege Vulnerability
CVE-2026-24293Windows Device Association Service Elevation of Privilege Vulnerability
CVE-2026-24294Performance Counters for Windows Elevation of Privilege Vulnerability
CVE-2026-24295Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2026-24296Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2026-25165Windows Authentication Elevation of Privilege Vulnerability
CVE-2026-25167Windows Extensible File Allocation Table Elevation of Privilege Vulnerability
CVE-2026-25170Windows NTFS Elevation of Privilege Vulnerability
CVE-2026-25171Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-25174Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2026-25175Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-25176Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-25177Winlogon Elevation of Privilege Vulnerability
CVE-2026-25178Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-25179Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-25187SQL Server Elevation of Privilege Vulnerability
CVE-2026-25188SQL Server Elevation of Privilege Vulnerability
CVE-2026-25189Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2026-26115Azure MCP Server Tools Elevation of Privilege Vulnerability
CVE-2026-26116Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-26117.NET Elevation of Privilege Vulnerability
CVE-2026-26118Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-26128Microsoft Office Elevation of Privilege Vulnerability
CVE-2026-26131Hybrid Worker Extension (Arc‑enabled Windows VMs) Elevation of Privilege Vulnerability
CVE-2026-26132Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability

Remote Code Execution (14 CVEs)

Critical severity
CVE-2026-21536Microsoft Devices Pricing Program Remote Code Execution Vulnerability
CVE-2026-26110Microsoft Office Remote Code Execution Vulnerability
CVE-2026-26113Microsoft Office Remote Code Execution Vulnerability
Important severity
CVE-2026-23654GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability
CVE-2026-23669Windows Print Spooler Remote Code Execution Vulnerability
CVE-2026-24288Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2026-25166Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability
CVE-2026-25172Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-25173Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-25190GDI Remote Code Execution Vulnerability
CVE-2026-26106Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-26107Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26108Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26109Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26111Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-26112Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26114Microsoft SharePoint Server Remote Code Execution Vulnerability

Information Disclosure (10 CVEs)

Critical severity
CVE-2026-26122Microsoft ACI Confidential Containers Information Disclosure Vulnerability
CVE-2026-26144Microsoft Excel Information Disclosure Vulnerability
Important severity
CVE-2026-23661Azure IoT Explorer Information Disclosure Vulnerability
CVE-2026-23662Azure IoT Explorer Information Disclosure Vulnerability
CVE-2026-23664Azure IoT Explorer Information Disclosure Vulnerability
CVE-2026-24282Push message Routing Service Elevation of Privilege Vulnerability
CVE-2026-25180Windows Graphics Component Information Disclosure Vulnerability
CVE-2026-25181GDI+ Information Disclosure Vulnerability
CVE-2026-25186Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability
CVE-2026-26123Microsoft Authenticator Information Disclosure Vulnerability

Denial of Service (4 CVEs)

Important severity
CVE-2026-25168Windows Graphics Component Denial of Service Vulnerability
CVE-2026-25169Windows Graphics Component Denial of Service Vulnerability
CVE-2026-26127.NET Denial of Service Vulnerability
CVE-2026-26130ASP.NET Core Denial of Service Vulnerability

Spoofing (4 CVEs)

Important severity
CVE-2026-23656Windows App Installer Spoofing Vulnerability
CVE-2026-25185Windows Shell Link Processing Spoofing Vulnerability
CVE-2026-26105Microsoft SharePoint Server Spoofing Vulnerability
CVE-2026-26121Azure IOT Explorer Spoofing Vulnerability

Security Feature Bypass (3 CVEs)

Important severity
CVE-2026-23674MapUrlToZone Security Feature Bypass Vulnerability
CVE-2026-24297Windows Kerberos Security Feature Bypass Vulnerability
CVE-2026-26143Microsoft PowerShell Security Feature Bypass Vulnerability

Appendix B: Exploitability and CVSS

This is a list of the six March CVEs judged by Microsoft to be more likely to be exploited in the wild within the first 30 days post-release. The list is arranged by CVE.

Exploitation more likely within the next 30 days
CVE-2026-23668Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-24289Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-24291Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability
CVE-2026-24294Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-25187Winlogon Elevation of Privilege Vulnerability
CVE-2026-26132Windows Kernel Elevation of Privilege Vulnerability

These are the March CVEs with a Microsoft-assessed CVSS Base score of 8.0 or higher. They are arranged by score and further sorted by CVE. For more information on how CVSS works, please see our series on patch prioritization schema.

CVSS BaseCVSS TemporalCVETitle
9.88.5CVE-2026-21536Microsoft Devices Pricing Program Remote Code Execution Vulnerability
8.87.7CVE-2026-20967System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability
8.87.7CVE-2026-21262SQL Server Elevation of Privilege Vulnerability
8.87.7CVE-2026-23654GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability
8.87.7CVE-2026-23669Windows Print Spooler Remote Code Execution Vulnerability
8.87.7CVE-2026-24283Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability
8.87.7CVE-2026-25172Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
8.87.7CVE-2026-25177Active Directory Domain Services Elevation of Privilege Vulnerability
8.87.7CVE-2026-25188Windows Telephony Service Elevation of Privilege Vulnerability
8.87.7CVE-2026-26106Microsoft SharePoint Server Remote Code Execution Vulnerability
8.87.7CVE-2026-26111Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
8.87.7CVE-2026-26114Microsoft SharePoint Server Remote Code Execution Vulnerability
8.87.7CVE-2026-26115SQL Server Elevation of Privilege Vulnerability
8.87.7CVE-2026-26116SQL Server Elevation of Privilege Vulnerability
8.87.7CVE-2026-26118Azure MCP Server Tools Elevation of Privilege Vulnerability
8.67.7CVE-2026-26125Payment Orchestrator Service Elevation of Privilege Vulnerability
8.47.3CVE-2026-26109Microsoft Excel Remote Code Execution Vulnerability
8.47.3CVE-2026-26110Microsoft Office Remote Code Execution Vulnerability
8.47.3CVE-2026-26113Microsoft Office Remote Code Execution Vulnerability
8.17.1CVE-2026-26105Microsoft SharePoint Server Spoofing Vulnerability
8.17.3CVE-2026-26148Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability
8.07.0CVE-2026-25173Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Appendix C: Products Affected

This is a list of March’s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple times, once for each product family. Certain issues for which advisories have been issued are covered in Appendix D, and issues affecting Windows Server are further sorted in Appendix E. All CVE titles are accurate as made available by Microsoft; for further information on why certain products may appear in titles and not product families (or vice versa), please consult Microsoft.

Windows (48 CVEs)

Important severity
CVE-2026-23656Windows App Installer Spoofing Vulnerability
CVE-2026-23667Broadcast DVR Elevation of Privilege Vulnerability
CVE-2026-23668Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-23669Windows Print Spooler Remote Code Execution Vulnerability
CVE-2026-23671Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability
CVE-2026-23672Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability
CVE-2026-23673Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVE-2026-23674MapUrlToZone Security Feature Bypass Vulnerability
CVE-2026-24282Push message Routing Service Elevation of Privilege Vulnerability
CVE-2026-24283Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability
CVE-2026-24285Win32k Elevation of Privilege Vulnerability
CVE-2026-24287Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-24288Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2026-24289Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-24290Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-24291Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability
CVE-2026-24292Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-24293Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-24294Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-24295Windows Device Association Service Elevation of Privilege Vulnerability
CVE-2026-24296Windows Device Association Service Elevation of Privilege Vulnerability
CVE-2026-24297Windows Kerberos Security Feature Bypass Vulnerability
CVE-2026-25165Performance Counters for Windows Elevation of Privilege Vulnerability
CVE-2026-25166Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability
CVE-2026-25167Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2026-25168Windows Graphics Component Denial of Service Vulnerability
CVE-2026-25169Windows Graphics Component Denial of Service Vulnerability
CVE-2026-25170Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2026-25171Windows Authentication Elevation of Privilege Vulnerability
CVE-2026-25172Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-25173Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-25174Windows Extensible File Allocation Table Elevation of Privilege Vulnerability
CVE-2026-25175Windows NTFS Elevation of Privilege Vulnerability
CVE-2026-25176Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-25177Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2026-25178Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-25179Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-25180Windows Graphics Component Information Disclosure Vulnerability
CVE-2026-25181GDI+ Information Disclosure Vulnerability
CVE-2026-25185Windows Shell Link Processing Spoofing Vulnerability
CVE-2026-25186Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability
CVE-2026-25187Winlogon Elevation of Privilege Vulnerability
CVE-2026-25188Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-25189Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-25190GDI Remote Code Execution Vulnerability
CVE-2026-26111Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-26128Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-26132Windows Kernel Elevation of Privilege Vulnerability

Azure (13 CVEs)

Critical severity
CVE-2026-23651Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
CVE-2026-26122Microsoft ACI Confidential Containers Information Disclosure Vulnerability
CVE-2026-26124Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
Important severity
CVE-2026-23660Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
CVE-2026-23661Azure IoT Explorer Information Disclosure Vulnerability
CVE-2026-23662Azure IoT Explorer Information Disclosure Vulnerability
CVE-2026-23664Azure IoT Explorer Information Disclosure Vulnerability
CVE-2026-23665Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability
CVE-2026-26117Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2026-26118Azure MCP Server Tools Elevation of Privilege Vulnerability
CVE-2026-26121Azure IOT Explorer Spoofing Vulnerability
CVE-2026-26141Hybrid Worker Extension (Arc‑enabled Windows VMs) Elevation of Privilege Vulnerability
CVE-2026-26148Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability

365 (7 CVEs)

Critical severity
CVE-2026-26110Microsoft Office Remote Code Execution Vulnerability
CVE-2026-26113Microsoft Office Remote Code Execution Vulnerability
CVE-2026-26144Microsoft Excel Information Disclosure Vulnerability
Important severity
CVE-2026-26107Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26108Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26109Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26112Microsoft Excel Remote Code Execution Vulnerability

Office (7 CVEs)

Critical severity
CVE-2026-26110Microsoft Office Remote Code Execution Vulnerability
CVE-2026-26113Microsoft Office Remote Code Execution Vulnerability
Important severity
CVE-2026-26107Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26108Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26109Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26112Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26134Microsoft Office Elevation of Privilege Vulnerability

Excel (4 CVEs)

Important severity
CVE-2026-26107Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26108Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26109Microsoft Excel Remote Code Execution Vulnerability
CVE-2026-26112Microsoft Excel Remote Code Execution Vulnerability

SharePoint (3 CVEs)

Critical severity
CVE-2026-26113Microsoft Office Remote Code Execution Vulnerability
Important severity
CVE-2026-26105Microsoft SharePoint Server Spoofing Vulnerability
CVE-2026-26106Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2026-26114Microsoft SharePoint Server Remote Code Execution Vulnerability

SQL Server (2 CVEs)

Important severity
CVE-2026-21262SQL Server Elevation of Privilege Vulnerability
CVE-2026-26115SQL Server Elevation of Privilege Vulnerability
CVE-2026-26116SQL Server Elevation of Privilege Vulnerability

NET (2 CVEs)

Important severity
CVE-2026-26127.NET Denial of Service Vulnerability
CVE-2026-26131.NET Elevation of Privilege Vulnerability

ASP.NET (1 CVE)

Important severity
CVE-2026-26130ASP.NET Core Denial of Service Vulnerability

GitHub Repo: Zero Shot scFoundation (1 CVE)

Important severity
CVE-2026-23654GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability

Microsoft Authenticator (1 CVE)

Important severity
CVE-2026-26123Microsoft Authenticator Information Disclosure Vulnerability

Microsoft Devices Pricing Program (1 CVE)

Critical severity
CVE-2026-21536Microsoft Devices Pricing Program Remote Code Execution Vulnerability

Payment Orchestrator Service (1 CVE)

Critical severity
CVE-2026-26125Payment Orchestrator Service Elevation of Privilege Vulnerability

PowerShell (1 CVE)

Important severity
CVE-2026-26143Microsoft PowerShell Security Feature Bypass Vulnerability

System Center Operations Manager (SCOM) (1 CVE)

Important severity
CVE-2026-20967System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability

Appendix D: Advisories and Other Products

March includes a CVE concerning an Important-severity RCE bug in Microsoft Semantic Kernel that rates a lofty 9.9 Base CVSS, though Microsoft judges that exploitation of the issue is unlikely within the next 30 days. There is a listed mitigation for this issue, which is to avoid using InMemoryVectorStore for production scenarios.

CVE-2026-26030GitHub: CVE-2026-26030 Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable

There are also ten Edge-related advisories listed in March’s release; all but CVE-2026-26140 were patched prior to Tuesday’s release. All but CVE-2026-3545 are marked in Microsoft’s information as unlikely to be exploited within the next 30 days.

CVE-2026-3536Chromium: CVE-2026-3536 Integer overflow in ANGLE
CVE-2026-3538Chromium: CVE-2026-3538 Integer overflow in Skia
CVE-2026-3539Chromium: CVE-2026-3539 Object lifecycle issue in DevTools
CVE-2026-3540Chromium: CVE-2026-3540 Inappropriate implementation in WebAudio
CVE-2026-3541Chromium: CVE-2026-3541 Inappropriate implementation in CSS
CVE-2026-3542Chromium: CVE-2026-3542 Inappropriate implementation in WebAssembly
CVE-2026-3543Chromium: CVE-2026-3543 Inappropriate implementation in V8
CVE-2026-3544Chromium: CVE-2026-3544 Heap buffer overflow in WebCodecs
CVE-2026-3545Chromium: CVE-2026-3545 Insufficient data validation in Navigation
CVE-2026-26140Microsoft Edge (Chromium-based) Spoofing Vulnerability

Finally, there are three updates from Adobe, all affecting Reader 25.001.20982, 24.001.30264 (Windows), 24.001.30273 (Mac) and earlier; they are addresseḍ in APSB26-26.

CVE-2026-27220Use After Free (CWE-416)
CVE-2026-27221Improper Verification of Cryptographic Signature (CWE-347)
CVE-2026-27278Use After Free (CWE-416)

Appendix E: Affected Windows Server versions

This is a table of the 45 CVEs in the March release affecting Windows Server versions 2012 through 2025. The table differentiates among major versions of the platform but doesn’t go into deeper detail (eg., Server Core). An “x” indicates that the CVE does not apply to that version. CVE-2026-23667, CVE-2026-24282, and CVE-2026-24288 affect only client-side versions of Windows and are thus not included in the table.

Administrators are encouraged to use this appendix as a starting point to ascertain their specific exposure, as each reader’s situation, especially as it concerns products out of mainstream support, will vary. For specific Knowledge Base numbers, please consult Microsoft.

CVE

S-12

12r2

S-16

S-19

S-22

23h2

S-25

CVE-2026-23656

CVE-2026-23668

×

CVE-2026-23669

CVE-2026-23671

×

×

CVE-2026-23672

CVE-2026-23673

CVE-2026-23674

CVE-2026-24283

×

×

×

×

×

CVE-2026-24285

CVE-2026-24287

×

×

×

CVE-2026-24289

CVE-2026-24290

×

×

×

CVE-2026-24291

CVE-2026-24292

×

×

×

CVE-2026-24293

×

×

×

×

CVE-2026-24294

CVE-2026-24295

×

×

CVE-2026-24296

×

CVE-2026-24297

×

×

×

CVE-2026-25165

CVE-2026-25166

×

×

×

CVE-2026-25167

×

×

×

×

×

×

CVE-2026-25168

CVE-2026-25169

CVE-2026-25170

×

×

×

×

CVE-2026-25171

CVE-2026-25172

CVE-2026-25173

CVE-2026-25174

CVE-2026-25175

×

CVE-2026-25176

CVE-2026-25177

CVE-2026-25178

CVE-2026-25179

CVE-2026-25180

CVE-2026-25181

CVE-2026-25185

CVE-2026-25186

CVE-2026-25187

CVE-2026-25188

CVE-2026-25189

×

×

×

×

×

CVE-2026-25190

CVE-2026-26111

CVE-2026-26128

CVE-2026-26132

×

×

×

×