Microsoft Patch Tuesday – March 2026
Patching updates
Last updated: 11 Mar 2026
Today is Microsoft Patch Tuesday for March 2026. There are 83 Microsoft vulnerabilities that have been addressed this time around. The most relevant items this month include a publicly disclosed SQL Server privilege-escalation flaw alongside several high-impact Windows, Active Directory, and SharePoint issues that should be prioritized in the regular patch cycle.
Notable Patch Tuesday vulnerabilities for March
- CVE-2026-21262 – This SQL Server issue was publicly disclosed before Patch Tuesday, which makes it especially important for organizations running exposed or business-critical database systems. A successful attacker with legitimate access to the SQL environment could raise their permissions all the way to SQL sysadmin, creating a path to full control over the affected database instance.
- CVE-2026-23669 – The Windows Print Spooler appears again in this month’s release with a remote code execution vulnerability. An authenticated attacker could send specially crafted network traffic to a system running the service and potentially trigger memory corruption, which could allow malicious code to run on the target machine.
- CVE-2026-25177 – This Active Directory Domain Services flaw stands out because it affects a core identity component used across many enterprise environments. In Microsoft’s guidance, a successful attack could lead to SYSTEM-level privileges, and the technique may also interfere with Kerberos authentication in ways that could disrupt services or force less secure fallback behavior.
- CVE-2026-26105 – SharePoint administrators should pay attention to this spoofing issue, which is rooted in a cross-site scripting weakness. By tricking a user into opening a malicious link, an attacker may be able to execute scripts in that user’s browser session and impersonate trusted SharePoint content or actions.
- CVE-2026-25188 – This Windows Telephony Service vulnerability is worth tracking in environments where the affected service is exposed inside the same domain or adjacent network segment. Microsoft says successful exploitation could allow an attacker to gain SYSTEM-level privileges by sending specially crafted traffic to a vulnerable server, making it a serious privilege-escalation issue for enterprise administrators.
For more detailed information on these and other vulnerabilities, please refer to the release notes:: https://msrc.microsoft.com/update-guide/releaseNote/2026-Mar
Need help addressing the above in your own organization? Speak to an Outpost24 expert.