Microsoft Patch Tuesday for March 2026 — Snort rules and prominent vulnerabilities
嗯,用户让我总结这篇文章的内容,控制在一百个字以内,而且不需要用特定的开头。首先,我需要快速浏览文章内容,抓住主要信息。 文章是关于微软3月份的安全更新,修复了79个漏洞,其中三个是关键漏洞。关键漏洞包括Office和Excel的远程代码执行和信息泄露问题。其他重要漏洞涉及SharePoint Server、SQL Server和Azure工具等。Cisco Talos还指出几个可能被利用的漏洞,并发布了新的Snort规则来检测这些漏洞的利用尝试。 接下来,我需要将这些信息浓缩到100字以内。重点包括:微软发布安全更新,修复79个漏洞,其中三个关键漏洞涉及Office和Excel的问题。其他重要漏洞涉及SharePoint、SQL Server和Azure工具。Talos提醒部分可能被利用的漏洞,并发布了检测规则。 现在检查字数是否在限制内,并确保没有使用“文章内容总结”之类的开头。这样应该能满足用户的需求。 </think> 微软发布3月安全更新,修复79个漏洞,其中3个为关键漏洞,涉及Office、Excel远程代码执行及信息泄露问题;其余为重要漏洞,包括SharePoint Server、SQL Server及Azure工具等风险。 Cisco Talos提醒部分高危漏洞可能被利用,并发布新规则检测攻击。 2026-3-10 22:33:24 Author: blog.talosintelligence.com(查看原文) 阅读量:4 收藏

Microsoft has released its monthly security update for March 2026 which includes 79 vulnerabilities, including three that Microsoft marked as “critical.” The remaining vulnerabilities listed are classified as “important.” Microsoft assessed that exploitation of the three “critical” vulnerabilities is “less likely.”  

CVE-2026-26110 and CVE-2026-26113 are “critical” Microsoft Office Remote Code Execution Vulnerabilities that could allow an unauthorized attacker to execute code locally; the former is a type confusion issue caused by access to a resource using an incompatible type, and the latter is an untrusted pointer dereference. 

CVE-2026-26144 is a “critical” information disclosure vulnerability affecting Microsoft Excel. This vulnerability is due to improper neutralization of input in Microsoft Excel which could enable an unauthorized attacker to disclose information on affected systems. This vulnerability has not been previously publicly disclosed or exploited, and Microsoft has rated it as “exploitation unlikely.” 

CVE-2026-26109 is an “important” vulnerability in Microsoft Office Excel that allows an unauthorized attacker to execute code locally due to an out-of-bounds read. This issue could enable an attacker to compromise the affected system. vulnerability in Microsoft Office Excel that allows an unauthorized attacker to execute code locally due to an out-of-bounds read. This issue could enable an attacker to compromise the affected system. 

CVE-2026-26106 and CVE-2026-26114 are “important” remote code execution vulnerabilities affecting Microsoft SharePoint Server. CVE-2026-26106 is caused by improper input validation in Microsoft Office SharePoint, while CVE-2026-26114 results from deserialization of untrusted data. In both cases, an authenticated attacker with at least Site Member permissions (PR:L) can execute code remotely over a network on the SharePoint Server. 

CVE-2026-26115CVE-2026-26116, and CVE-2026-21262 are “important” elevation of privilege vulnerabilities in SQL Server, each with a CVSS v3.1 highest base score of 8.8. CVE-2026-26115 is caused by improper input validation in SQL Server, while CVE-2026-26116 is due to improper neutralization of special elements used in a SQL command ('sqlinjection'). CVE-2026-21262 results from improper access control in SQL Server. In each case, an authorized attacker could exploit the vulnerability over a network to elevate privileges, potentially gaining administrator privileges. CVE-2026-21262 has also been publicly disclosed. 

CVE-2026-26118 is an elevation of privilege vulnerability in Azure MCP Server Tools with a CVSS v3.1 highest base score of 8.8. It has been rated “important” by Microsoft. This vulnerability is caused by server-side request forgery (SSRF) in Azure MCP Server, which allows an authorized attacker to elevate privileges over a network. An attacker could exploit this issue by sending specially crafted input to an Azure Model Context Protocol (MCP) Server tool that accepts user-provided parameters. If the attacker can interact with the MCP-backed agent, they may submit a malicious URL instead of a standard Azure resource identifier. The MCP Server then sends an outbound request to that URL, possibly includingits managed identity token. The attacker can capture this token without requiring administrative access. A successful attacker could obtain the permissions associated with the MCP Server’s managed identity, enabling access or actions on any resources authorized for that identity. However, the attacker does not gain broader tenant-level or administrator permissions—only those linked to the compromised managed identity.  

CVE-2026-26128 is an elevation of privilege vulnerability in Windows SMB Server that has been rated “important” by Microsoft. This vulnerability is caused by improper authentication in Windows SMB Server, allowing an authorized attacker to elevate privileges over a network. An attacker who successfully exploits this vulnerability could gain SYSTEM privileges. 

Cisco Talos would also like to highlight several vulnerabilities that are only rated as “important,” but Microsoft lists as “more likely” to be exploited:  

  • CVE-2026-23668 - Windows Graphics Component Elevation of Privilege Vulnerability 
  • CVE-2026-24289 - Windows Kernel Elevation of Privilege Vulnerability 
  • CVE-2026-24291 - Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability 
  • CVE-2026-24294 - Windows SMB Server Elevation of Privilege Vulnerability 
  • CVE-2026-25176 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability 
  • CVE-2026-25187 - Winlogon Elevation of Privilege Vulnerability 

A complete list of all the other vulnerabilities Microsoft disclosed this month is available on its update page. In response to these vulnerability disclosures, Talos is releasing a new Snort rule set that detects attempts to exploit some of them. Please note that additional rules may be released at a future date and current rules are subject to change pending additionalinformation. Cisco Security Firewall customers should use the latest update to their ruleset by updating their SRU. Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.  

The rules included in this release that protect against the exploitation of many of these vulnerabilities are: 66089 - 66092, 66096, 66097, 66101 - 66104. 

The following Snort 3 rules are also available: 301442 – 301446. 


文章来源: https://blog.talosintelligence.com/microsoft-patch-tuesday-march-2026/
如有侵权请联系:admin#unsafe.sh