Microsoft’s March 2026 Patch Tuesday Addresses 83 CVEs (CVE-2026-21262, CVE-2026-26127)
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经给出了文章的详细内容,包括微软在2026年3月补丁星期二活动中修复了83个CVE漏洞,其中8个是关键漏洞,75个是重要漏洞。文章还提到了这些漏洞涉及的组件和类型,比如SQL Server、.NET、Windows内核等,其中大部分是权限提升漏洞。 首先,我要确定文章的主要信息点:微软修复了83个CVE漏洞,其中有8个关键和75个重要漏洞。此外,提到了两个公开披露的漏洞,并且主要的漏洞类型是权限提升(EoP),占55.4%,其次是远程代码执行(RCE)占20.5%。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖主要的数字和关键点:修复的总数、关键和重要的数量、公开披露的情况、主要的漏洞类型及其百分比。 可能会遇到的问题是如何简洁地表达这些信息而不遗漏重要细节。例如,“Microsoft在3月修复了83个CVE”已经涵盖了总数,“其中8个关键,75个重要”补充了分类情况。然后提到“包括两个公开披露”说明了部分漏洞的情况。接着,“主要为权限提升(占55.4%)和远程代码执行(20.5%)”总结了漏洞类型及其比例。 最后,检查字数是否符合要求,并确保语言流畅自然。 </think> 微软在3月修复了83个CVE漏洞,其中8个为关键级别,75个为重要级别。此次更新包括针对.NET、SQL Server、Windows内核等多个组件的安全补丁。其中两个漏洞在补丁发布前已公开披露。权限提升(EoP)占所有漏洞的55.4%,其次是远程代码执行(RCE)占20.5%。 2026-3-10 17:59:53 Author: www.tenable.com(查看原文) 阅读量:7 收藏


March 10, 2026

4 Min Read


A colorful header graphic from Tenable Research Special Operations regarding Microsoft Patch Tuesday for March 2026. The center features a hexagon containing a blue bandage icon and text that reads "Microsoft Patch Tuesday: Zero Day Vulnerabilities, March 2026." The background consists of a vibrant, diagonal geometric pattern of overlapping blue, red, yellow, and green stripes.

  1. 8Critical
  2. 75Important
  3. 0Moderate
  4. 0Low

Microsoft addresses 83 CVEs including two vulnerabilities that were publicly disclosed prior to a patch being released.

Microsoft patched 83 CVEs in its March 2026 Patch Tuesday release, with eight rated critical and 75 rated as important. Our counts omitted one CVE (CVE-2026-26030) assigned by GitHub.

A pie chart showing the severity distribution across the Patch Tuesday CVEs patched in March 2026.

This month’s update includes patches for:

  • .NET
  • ASP.NET Core
  • Active Directory Domain Services
  • Azure Arc
  • Azure Compute Gallery
  • Azure Entra ID
  • Azure IoT Explorer
  • Azure Linux Virtual Machines
  • Azure MCP Server
  • Azure Portal Windows Admin Center
  • Azure Windows Virtual Machine Agent
  • Broadcast DVR
  • Connected Devices Platform Service (Cdpsvc)
  • Microsoft Authenticator
  • Microsoft Brokering File System
  • Microsoft Devices Pricing Program
  • Microsoft Graphics Component
  • Microsoft Office
  • Microsoft Office Excel
  • Microsoft Office SharePoint
  • Payment Orchestrator Service
  • Push Message Routing Service
  • Role: Windows Hyper-V
  • SQL Server
  • System Center Operations Manager
  • Windows Accessibility Infrastructure (ATBroker.exe)
  • Windows Ancillary Function Driver for WinSock
  • Windows App Installer
  • Windows Authentication Methods
  • Windows Bluetooth RFCOM Protocol Driver
  • Windows DWM Core Library
  • Windows Device Association Service
  • Windows Extensible File Allocation
  • Windows File Server
  • Windows GDI
  • Windows GDI+
  • Windows Kerberos
  • Windows Kernel
  • Windows MapUrlToZone
  • Windows Mobile Broadband
  • Windows NTFS
  • Windows Performance Counters
  • Windows Print Spooler Components
  • Windows Projected File System
  • Windows Resilient File System (ReFS)
  • Windows Routing and Remote Access Service (RRAS)
  • Windows SMB Server
  • Windows Shell Link Processing
  • Windows System Image Manager
  • Windows Telephony Service
  • Windows Universal Disk Format File System Driver (UDFS)
  • Windows Win32K
  • Winlogon

A bar chart showing the count by impact of CVEs patched in the March 2026 Patch Tuesday release.

Elevation of privilege (EoP) vulnerabilities accounted for 55.4% of the vulnerabilities patched this month, followed by remote code execution (RCE)vulnerabilities at 20.5%.

CVE-2026-21262, CVE-2026-26115 and CVE-2026-26116 | SQL Server Elevation of Privilege Vulnerability

CVE-2026-21262, CVE-2026-26115 and CVE-2026-26116 are EoP vulnerabilities affecting Microsoft SQL Server. Each of these flaws received a CVSSv3 score of 8.8 and were rated as important. While each of these were assessed as “Exploitation Less Likely” according to Microsoft’s Exploitability Index, CVE-2026-21262 was publicly disclosed as a zero-day. While no exploitation has been reported by Microsoft, a successful exploit of any one of these three flaws would result in an attacker gaining SQL sysadmin privileges.

CVE-2026-26127 |.NET Denial of Service Vulnerability

CVE-2026-26127 is a denial of service (DoS) vulnerability affecting.NET 9.0 and 10.0 on Windows, Mac OS and Linux. It received a CVSSv3 score of 7.5 and was rated as important. According to Microsoft, this vulnerability was publicly disclosed prior to patches being made available. Although it was publicly disclosed, Microsoft assesses that exploitation is unlikely for this DoS vulnerability.

.NET updates this month also include patches to address CVE-2026-26131, an important severity EoP vulnerability for.NET 10 installations on Linux.

CVE-2026-24287, CVE-2026-24289 and CVE-2026-26132 | Windows Kernel Elevation of Privilege Vulnerability

CVE-2026-24287, CVE-2026-24289 and CVE-2026-26132 are EoP vulnerabilities in the Windows Kernel. Each was assigned CVSSv3 scores of 7.8 and rated important. A local, authenticated attacker could exploit these vulnerabilities in order to gain SYSTEM privileges. While Microsoft reports no evidence of exploitation, it did assess CVE-2026-24289 and CVE-2026-26132 as “Exploitation More Likely.” Including these three CVEs, six EoPs affecting Windows Kernel have been patched so far in 2026.

CVE-2026-26118 | Azure MCP Server Tools Elevation of Privilege Vulnerability

CVE-2026-26110 and CVE-2026-26113 | Microsoft Office Remote Code Execution Vulnerability

CVE-2026-26110 and CVE-2026-26113 are RCE vulnerabilities affecting Microsoft Office. Both received CVSSv3 scores of 8.4 and were rated as critical. A local, unauthenticated attacker could exploit these vulnerabilities to achieve local code execution. Microsoft notes that the preview pane is an attack vector for these flaws and both CVEs were assessed as “Exploitation Less Likely.”

Tenable Solutions

A list of all the plugins released for Microsoft’s March 2026 Patch Tuesday update can be found here. As always, we recommend patching systems as soon as possible and regularly scanning your environment to identify those systems yet to be patched.

For more specific guidance on best practices for vulnerability assessments, please refer to our blog post on How to Perform Efficient Vulnerability Assessments with Tenable.

Get more information

Join Tenable's Research Special Operations (RSO) Team on Tenable Connect for further discussions on the latest cyber threats.

Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.


Research Special Operations

Research Special Operations

The Research Special Operations (RSO) team serves as Tenable’s Forward Logistics Element in the threat landscape, providing customers with the analyses and contextualized exposure intelligence required to manage risks to critical business assets. With over 150 years of collective expertise, this hand-picked group of world-class security researchers is united with one mission: to cut through the noise and deliver critical intelligence about the most dangerous cyber threats emerging right now. Uniting the missions of the Tenable Security Response, Zero-Day Research, and Decision Science Operations teams, RSO disseminates timely, accurate, and actionable information about the latest threats and exposures.

  • Exposure Management
  • Vulnerability Management

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.


文章来源: https://www.tenable.com/blog/microsofts-march-2026-patch-tuesday-addresses-83-cves-cve-2026-21262-cve-2026-26127
如有侵权请联系:admin#unsafe.sh