Microsoft released patches for 83 CVEs in its March security update, with six considered more likely to be exploited. The update is larger than last month's but is generally viewed by experts as non-urgent, requiring no immediate panic or rushed deployment. The main vulnerability types addressed are elevation of privilege (EoP) flaws, which make up over half of the patches, and remote code execution (RCE) bugs. Only one vulnerability received a near-maximum severity score, but it has already been mitigated. The article covers the scope of the Patch Tuesday update, expert assessments of its urgency, and details on the key vulnerability types, including specific notable flaws.
Microsoft Patches 83 CVEs in March Update
For a change, there's little in this month's Patch Tuesday that should cause panic, according to security experts.
Microsoft this week released patches for 83 CVEs across its product range, six of which it expects attackers are more like to exploit for a variety of reasons.
The patch drop is larger than last month's relatively light 63-patch security update and contains the usual mix of privilege escalation vulnerabilities, remote code execution (RCE) flaws, denial of service issues, vulnerabilities that enable data theft and other bugs. However, there's little in the set that merits an immediate all-hands on-deck kind of response that some Microsoft updates warrant, according to some security experts.
For the most part, Microsoft's March patch release should pose relatively fewer challenges than usual, observed Tyler Reguly, associated director of security R&D at Fortra. "I don’t see a lot of reasons for people to stress," Reguly said in statement to Dark Reading. The only vulnerability to which Microsoft assigned a near maximum severity score has already been fixed and requires no user action.
"The messaging this month should be, 'Apply your patches after you finish your testing cycles," he said. "There’s nothing that requires rushing patches, nothing that requires panic…this is just a nice, quiet Patch Tuesday."
A Relatively Light Month
Microsoft assigned a CVSS severity score of more than 9 out of a 10 to just one vulnerability in this month's set-- CVE-2027-21536 (CVSS 9.8), an RCE vulnerability related to Microsoft Devices Pricing Program for channel partners and distributors.
Ben McCarthy, lead cyber security engineer at Immersive, described the flaw as notable for being one of the first known vulnerabilities that an AI agent identified and which has an official CVE. "Although Microsoft has already patched and mitigated the vulnerability, it highlights a shift toward AI-driven discovery of complex vulnerabilities at increasing speed," he said in an emailed comment.
Eight of the flaws disclosed this week have a severity rating of critical. Two others were publicly known prior to this week's patch update: CVE-2026-26127 (CVSS 7.5), a .NET denial of service vulnerability and CVE-2026-21262 (CVSS 8.8), a SQL Server elevation of privilege flaw.
Both bugs are technically zero-day flaws, but neither pose much of a threat, according to Satnam Narang, senior staff research engineer at Tenable. "Their public disclosure prior to today is the only novel trait," he said in a statement. "These bugs are more bark than bite. The DoS vulnerability is assessed as unlikely to be exploited and requires an attacker to be authorized beforehand, while the privilege escalation bug was deemed less likely to be exploited."
EoP Bugs Rule
Elevation of privilege (EoP) bugs handily beat out all other vulnerability categories in Microsoft's Patch Tuesday this month and accounted for some 55.4% of the patched CVEs by Tenable's count. RCE vulnerabilities, which are often — and not always correctly — assumed more dangerous than EoP vulnerabilities, clocked in at 20.5%.
Among the EoP vulnerabilities that security vendors highlighted were three affecting the Windows kernel: CVE-2026-24289 (CVSS 7.8); CVE-2026-26132 (CVSS 7.8); and CVE-2026-24287 (CVSS 7.8). Of these, Microsoft assessed CVE-2026-24289 and CVE-2026-26132 as flaws that attackers would more likely exploit because they involve low attack complexity, no special privileges and no user interaction.
Amol Sarwate, head of security research at Cohesity, recommended that administrators also pay attention to two other EoP vulnerabilities because attackers will more likely attempt to exploit them: CVE-2026-24294 (CVSS 7.8) in SMB Server and CVE-2026-23668 (CVSS 7.0) in Microsoft Graphics Component. "Elevation of privilege is one of the attackers’ primary methods for gaining access to networks and maintaining dwell time," Sarwate said in emailed comments.
RCE Bugs Worth Noting
The RCE vulnerabilities that security experts pointed to as more noteworthy in this month's set are two affecting Microsoft Office: CVE-2026-26113 (CVSS 8.4) and CVE-2026-26110 (CVSS 8.4). The Preview Pane is an attack vector in both cases, meaning a user could be compromised without having to open a malcious document or file.
"If the security update cannot be applied immediately, organizations should disable the Preview Pane in file explorers and restrict the opening of Office files from untrusted sources," advised Jack Bicer, director of vulnerability research at Action1, in a statement. "Implementing email filtering, attachment scanning, and endpoint protection monitoring can also reduce the risk of malicious document delivery."
CVE-2026-25190 (CVS 7.8) an RCE vulnerability in GDI, and CVE-2026-25181 (CVSS 7.5), an information disclosure vulnerability in GDI+, the graphics APIs in Windows, are two vulnerabilities in Microsoft's less-likely-to-be-exploited list this month. But when chained, the two flaws enable a dual-stage attack that an attacker could use to bypass a Windows security feature and execute arbitrary code. However, pulling off such an attack would take some doing, according to Ryan Braunstein, security manager at Automox.
"The precision required to pull this off suggests nation-state-level investment, but the payoff matches: clean, reliable remote code execution on the target system," he said in an emailed comment.