Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Dozens of vendors patch security flaws across enterprise software and network devices

What boards must demand in the age of automated AI abuse

EU strategy for rapid deployment of small and advanced modular nuclear reactors

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft patches 84 flaws (including 2 public zero-days) in March Patch Tuesday
Identity

Microsoft patches 84 flaws (including 2 public zero-days) in March Patch Tuesday

userBy userMarch 11, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two listed as publicly known.

Of these, 8 are rated as “critical” and 76 are rated as “important.” Forty-six of the patched vulnerabilities are related to privilege escalation, followed by remote code execution (18), information disclosure (10), spoofing (4), denial of service (4), and security feature bypass flaws (2).

This fix is ​​in addition to 10 vulnerabilities that have been addressed in the Chromium-based Edge browser since the release of the February 2026 Patch Tuesday update.

The two publicly disclosed zero-days are CVE-2026-26127, a .NET denial of service vulnerability (CVSS score: 7.5), and CVE-2026-21262, a SQL Server privilege elevation vulnerability (CVSS score: 8.8).

The vulnerability with the highest CVSS score in this month’s update is the Remote Code Execution Critical Flaw in the Microsoft Device Pricing Program. According to Microsoft, CVE-2026-21536 (CVSS score: 9.8) is fully mitigated and does not require any user action. XBOW, an autonomous vulnerability discovery platform powered by artificial intelligence (AI), is credited with discovering and reporting the issue.

“This month, more than half (55%) of all Patch Tuesday CVEs were privilege escalation bugs, six of which were rated as likely to be exploited across Windows Graphics Components, Windows Accessibility Infrastructure, Windows Kernel, Windows SMB Server, and Winlogon,” said Satnam Narang, Senior Staff Research Engineer at Tenable.

“We find that these bugs are typically used by attackers as part of their post-compromise activities once they have entered the system through other means (social engineering, exploitation of another vulnerability).”

Specifically, the Winlogon privilege escalation flaw (CVE-2026-25187, CVSS score: 7.8) leverages improper link resolution to gain SYSTEM privileges. Google Project Zero researcher James Forshaw is credited with reporting this vulnerability.

“This vulnerability allows a locally authenticated attacker with low privileges to exploit the link tracing condition of the Winlogon process and escalate to SYSTEM privileges,” said Jacob Ashdown, a cybersecurity engineer at Immersive. “This vulnerability does not require user interaction and has low attack complexity, making it an easy target for attackers to gain a foothold.”

Another notable vulnerability is CVE-2026-26118 (CVSS score: 8.8). This is a server-side request forgery bug in the Azure Model Context Protocol (MCP) server that could allow an authorized attacker to escalate privileges over the network.

“An attacker could exploit this issue by sending specially crafted input to the Azure Model Context Protocol (MCP) server tool that accepts user-specified parameters,” Microsoft said.

“If an attacker is able to interact with an MCP-backed agent, they could send a malicious URL instead of a normal Azure resource identifier. The MCP server then sends an outbound request to that URL, which may include a managed identity token. This allows the attacker to obtain that token without requiring administrative access.”

Successful exploitation of this vulnerability could allow an attacker to obtain privileges associated with the managed identity of an MCP server. An attacker could use this behavior to access or perform actions on resources that the managed identity is authorized to access.

Among the high severity bugs resolved by Microsoft is an information disclosure flaw in Excel. Tracked as CVE-2026-26144 (CVSS score 7.5), it is described as a case of cross-site scripting that occurs as a result of improper invalidation of input during web page generation.

The Windows maker said that an attacker could exploit this flaw to exfiltrate data in Copilot Agent mode as part of a zero-click attack.

“Information disclosure vulnerabilities are especially dangerous in corporate environments, where Excel files often contain financial data, intellectual property, and business records,” Alex Vovk, CEO and co-founder of Action1, said in a statement.

“If exploited, an attacker could silently extract sensitive information from internal systems without any obvious warning. Organizations using AI-assisted productivity features are at increased risk as automated agents may unintentionally send sensitive data outside the corporate perimeter.”

The patch comes after Microsoft announced that it would change the default behavior of Windows Autopatch by enabling hotpatch security updates to help secure devices at a faster pace.

“This change in default behavior will apply to all devices targeted by Microsoft Intune and devices that access the service via the Microsoft Graph API starting with the May 2026 Windows Security Update,” Redmond said. “By applying security fixes without waiting for a reboot, organizations can achieve 90% compliance in half the time while maintaining control.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSandia’s PFAS Detector Can Reduce Water Testing Time to Minutes
Next Article UK scraps charges on offshore wind, saving manufacturers millions of dollars
user
  • Website

Related Posts

Dozens of vendors patch security flaws across enterprise software and network devices

March 11, 2026

What boards must demand in the age of automated AI abuse

March 11, 2026

UNC6426 Exploit nx npm supply chain attack to gain AWS administrator access within 72 hours

March 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Dozens of vendors patch security flaws across enterprise software and network devices

What boards must demand in the age of automated AI abuse

EU strategy for rapid deployment of small and advanced modular nuclear reactors

UK scraps charges on offshore wind, saving manufacturers millions of dollars

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.