Microsoft March 2026 Patch Tuesday updates fix 79 security vulnerabilities across Windows, Office, SQL Server, and the .NET framework, including two publicly disclosed zero-day flaws.
The patches impact several Microsoft platforms, including Windows, Microsoft Office, SQL Server, Microsoft Edge, and the .NET framework. Organizations are strongly encouraged to install the updates quickly to protect their systems.
Microsoft March 2026 Patch Tuesday Vulnerability Breakdown
The March 2026 update includes vulnerabilities across different categories affecting enterprise infrastructure.
Out of the 79 vulnerabilities patched:
• 3 are rated Critical
• the remaining vulnerabilities are classified as Important or Low severity
Many of the issues fall into these major categories:
• 46 elevation of privilege vulnerabilities
• 18 remote code execution vulnerabilities
• multiple information disclosure, spoofing, and denial-of-service flaws
Elevation of privilege vulnerabilities allow attackers to gain higher permissions inside a system, while remote code execution vulnerabilities may allow attackers to run malicious code remotely.
Two Publicly Disclosed Zero-Day Vulnerabilities
Microsoft also fixed two zero-day vulnerabilities that were publicly disclosed before official patches were released.
Although these vulnerabilities are not currently known to be actively exploited, public disclosure increases the likelihood of attackers developing exploits.
The two notable vulnerabilities include:
• SQL Server Elevation of Privilege (CVE-2026-21262)
This vulnerability could allow an attacker with limited access to escalate privileges and gain administrative control over SQL Server.
• .NET Denial of Service Vulnerability
This flaw impacts the .NET framework and could allow attackers to disrupt applications and cause service outages.
Patched Vulnerabilities
Below is a sample list of some vulnerabilities addressed in the March 2026 update.
| CVE ID | Vulnerability | Type | Severity |
|---|---|---|---|
| CVE-2024-29059 | .NET Framework Information Disclosure | Information Disclosure | Important |
| CVE-2024-29057 | Microsoft Edge (Chromium-based) Spoofing | Spoofing | Low |
| CVE-2024-28916 | Xbox Gaming Services Elevation of Privilege | Elevation of Privilege | Important |
| CVE-2024-26247 | Microsoft Edge Security Feature Bypass | Security Feature Bypass | Low |
| CVE-2024-26204 | Outlook for Android Information Disclosure | Information Disclosure | Important |
| CVE-2024-26203 | Azure Data Studio Elevation of Privilege | Elevation of Privilege | Important |
| CVE-2024-26199 | Microsoft Office Elevation of Privilege | Elevation of Privilege | Important |
| CVE-2024-26198 | Microsoft Exchange Server Remote Code Execution | Remote Code Execution | Important |
| CVE-2024-26197 | Windows Storage Management Denial of Service | Denial of Service | Important |
| CVE-2024-26190 | Microsoft QUIC Denial of Service | Denial of Service | Important |
Microsoft also patched several vulnerabilities affecting Windows kernel components, Microsoft Edge, Azure tools, Visual Studio Code, and enterprise services.
Why Organizations Should Patch Quickly
Cyber attackers often analyze Patch Tuesday updates to identify newly fixed vulnerabilities. Systems that remain unpatched may become easy targets for exploitation.
Applying updates promptly helps reduce the risk of:
• unauthorized system access
• privilege escalation attacks
• remote code execution attempts
• potential data breaches
Recommended Security Actions
Organizations should take the following steps to reduce risk:
• deploy the March 2026 security updates as soon as possible
• prioritize updates for internet-facing and critical servers
• test patches in a staging environment before full deployment
• monitor SQL Server and .NET applications for unusual activity
• review Microsoft Office configurations to prevent malicious file attacks
Keeping systems fully updated remains one of the most effective ways to protect enterprise environments from evolving cyber threats.