Microsoft March 2026 Patch Tuesday: Overview
Microsoft released its March 2026 Patch Tuesday on March 10, 2026, patching 79 security vulnerabilities across Windows, Office, Azure, and related products. The update includes 2 publicly disclosed zero-days, 3 Critical-rated flaws (2 remote code execution, 1 information disclosure), and dozens of Important-severity issues. None of the zero-days are confirmed as actively exploited in the wild at time of release, but the context follows February 2026's unprecedented six actively exploited zero-days.
Microsoft also continues deploying updated Secure Boot certificates ahead of the June 2026 expiration of the original 2011 certificates — making this cycle particularly important for organizations managing endpoint integrity.
Two Publicly Disclosed Zero-Days
This month's Patch Tuesday fixes two zero-day vulnerabilities that were publicly disclosed before patches were available:
- CVE-2026-21262 — SQL Server Elevation of Privilege Vulnerability. Publicly disclosed prior to this patch cycle. Allows an attacker to gain elevated privileges on affected SQL Server instances.
- .NET Denial of Service Flaw — An out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network. Attributed to an anonymous researcher and publicly disclosed before the fix.
Microsoft classifies a zero-day as any vulnerability that was publicly disclosed or actively exploited before an official fix was available. Neither of this month's zero-days have confirmed in-the-wild exploitation as of the March 10 release.
Critical Office RCEs Exploitable via Preview Pane
Two Critical remote code execution vulnerabilities in Microsoft Office stand out as high-priority patches this month:
- CVE-2026-26110 — Microsoft Office Remote Code Execution. Can be triggered through the preview pane, meaning no user interaction beyond opening a folder is required.
- CVE-2026-26113 — Microsoft Office Remote Code Execution. Also exploitable via the preview pane, making both flaws particularly dangerous in enterprise environments where document previews are common.
Security teams should prioritize patching Office installations immediately, as preview-pane exploitation significantly lowers the attack barrier — victims do not need to open or execute a file for the exploit to trigger.
Excel and Microsoft Copilot Data Exfiltration Flaw (CVE-2026-26144)
A notable information disclosure vulnerability, CVE-2026-26144, affects Microsoft Excel in conjunction with Microsoft Copilot's Agent mode. According to Microsoft's advisory, an attacker who successfully exploits this vulnerability could cause Copilot Agent mode to exfiltrate data via unintended network egress — enabling a zero-click information disclosure attack.
This is particularly concerning for enterprise environments using Microsoft 365 Copilot with connected data sources, as sensitive documents or business data could be exfiltrated without any user action once an attacker has crafted a malicious file that reaches the victim's system.
Context: Following February 2026's Six Actively Exploited Zero-Days
March's release arrives in the wake of February 2026's alarming Patch Tuesday, which addressed 59 vulnerabilities including six actively exploited zero-days — one of the most critical Patch Tuesday releases in recent history. Those included flaws in the MSHTML Framework (CVE-2026-21513, CVSS 8.8, linked to Russia-linked APT28), Microsoft Word, Desktop Window Manager, Windows Shell, and Remote Desktop Services.
The APT28-linked CVE-2026-21513 — patched in February — involved a specially crafted Windows Shortcut (LNK) file embedding an HTML payload, exploiting nested iframes to manipulate trust boundaries and bypass Mark of the Web (MotW) protections. The attack leveraged infrastructure at wellnesscaremed[.]com to deliver multistage payloads targeting government and enterprise networks.
Full Breakdown by Severity and Category
The 79 CVEs patched in March 2026 break down as follows:
- Critical: 3 (2 RCE, 1 Information Disclosure)
- Important: 76 (including EoP, DoS, Spoofing, and additional RCEs)
- Zero-days (publicly disclosed): 2 (CVE-2026-21262, .NET DoS)
- Affected products: Windows, Microsoft Office, Excel, Azure IoT Explorer, Azure Linux VMs, Azure MCP Server, Windows Admin Center, Windows SMB Server, Windows Shell Link Processing
What Security Teams Should Do Now
Given the preview-pane RCEs and the Copilot data exfiltration flaw, security teams should treat this as a high-priority patch cycle:
- Patch Microsoft Office immediately — CVE-2026-26110 and CVE-2026-26113 are exploitable without user file execution
- Update Microsoft Excel / Microsoft 365 to address CVE-2026-26144 Copilot exfiltration risk
- Apply SQL Server patches to remediate CVE-2026-21262
- Deploy via Windows Update or WSUS — Microsoft recommends immediate installation for all supported versions
- Review Secure Boot certificate updates — new 2023 certificates are being deployed ahead of June 2026 expiration of original 2011 certificates







