Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

Op-Ed: Microsoft Patch Tuesday reveals 77 vulnerabilities

Microsoft is publishing 77 vulnerabilities this March 2026 Patch Tuesday, and none are being exploited… Yet.

user icon Adam Barnett, Lead Software Engineer at Rapid7 Wed, 11 Mar 2026
Op-Ed: Microsoft Patch Tuesday reveals 77 vulnerabilities

Microsoft is aware of public disclosure of two of today’s Patch Tuesday vulnerabilities, but without evidence of exploitation in the wild for any (yet), so there are no Microsoft additions to CISA’s KEV today.

Earlier in the month, Microsoft provided patches to address nine browser vulnerabilities, which are not included in the Patch Tuesday count above.

SQL Server often goes several months in a row without any mention on Patch Tuesday. Today, however, all versions from the latest and greatest SQL Server 2025 back as far as SQL Server 2016 SP3 receive patches for CVE-2026-21262, a SQL Server elevation of privilege vulnerability.

 
 

This isn’t just any elevation of privilege vulnerability, either; the advisory notes that an authorised attacker can elevate privileges to sysadmin over a network. The CVSS v3 base score of 8.8 is just below the threshold for critical severity, since low-level privileges are required.

Microsoft is aware of public disclosure, so while they assess the likelihood of exploitation as less likely, it would be a courageous defender who shrugged and deferred the patches for this one. Most SQL Server admins and security teams concluded many years ago that exposing SQL Server directly to the internet was not a good idea. Then again, popular search engines for internet-connected devices describe tens of thousands of SQL Server instances, and they can’t all be honeypots.

What could an attacker do as an SQL Server sysadmin? Beyond exfiltrating or interfering with the database itself, the obvious target is xp_cmdshell, which allows direct callouts to the underlying OS. The good news is that xp_cmdshell is disabled by default as far back as SQL Server 2005; the bad news is that anyone acting as SQL Server sysadmin can enable it in seconds.

At that point, the attacker is acting with the full privileges of the security context under which SQL Server runs, which is ideally a purpose-built account designed with least privilege in mind. If you want to hear some hair-raising stories, you have only to ask any incident response veteran if they’ve ever seen it set up differently.

Anyone paying for Extended Security Updates (ESU) for SQL Server 2014 or SQL Server 2012 may be forgiven for wondering why there’s no security update for those venerable versions of the world’s most widely deployed closed-source database product. We can hope that the vulnerability described by CVE-2026-21262 was introduced in newer codebases only.

Attackers fond of low-effort denial of service attacks against .NET applications will be checking out CVE-2026-26127 today. Microsoft is aware of public disclosure. While the immediate impact of exploitation is likely contained to denial of service by triggering a crash, opportunities for other types of attacks might emerge during a service reboot.

Alternatively, if a log forwarder or security agent is impacted, even for a brief period of time, an attacker might carry out an attack in that moment, hoping to evade detection under cover of this artificial darkness. Even if a low-skilled attacker simply causes downtime, in some contexts that could be enough to cause an SLA breach or loss of revenue, or at the very least cause a bleary-eyed defender to get paged in the middle of the night.

Microsoft Authenticator mobile app users on both iOS and Android should make sure to update to the latest version to guard against CVE-2026-26123. The Authenticator app is often installed on a personal device, but provides multi-factor authentication codes for production services in a bring-your-own-device context. Since users can often choose their own authenticator app, defenders wishing to guard against the possibility of a malicious app impersonating Microsoft Authenticator should consider how their mobile device management policy handles this scenario.

The CVSS v3 base score of 5.5 is unremarkable, and exploitation requires user interaction, since the user must select the malicious app as the handler for the sign-in flow. However, Microsoft ranks this vulnerability as important on their proprietary severity scale. The impact of exploitation could be a malicious app impersonating Authenticator, and receiving enough information to impersonate the user.

The advisory also provides a brief peek behind the curtain, since the executive summary notes that “Cwe is not in rca”. The weakness listed on the advisory is CWE-939: Improper Authorisation in Handler for Custom URL Scheme.

There are no significant Microsoft product lifecycle changes this month, unless you’re responsible for a Microsoft SQL Server 2012 Parallel Data Warehouse instance, which moves beyond extended support as of March 31st. It would be wise not to count on a last-minute extension, since Microsoft has already granted a six month reprieve.

A full analysis can be found here.