Structured data rendered for: WebPage
Back to Blog

Microsoft March 2026 Patch Tuesday Fixes Two Zero-Days

March 14, 2026
4 min read
Microsoft March 2026 Patch Tuesday Fixes Two Zero-Days

Why This Patch Tuesday Matters

Microsoft's March 2026 Patch Tuesday addressed 79 vulnerabilities, including two publicly disclosed zero-days and three critical remote code execution flaws. While none were confirmed actively exploited at release, the combination of Office preview-pane RCE and SQL Server privilege escalation makes this cycle particularly high-stakes for enterprise defenders.

Zero-Days and Critical CVEs

CVEComponentCVSSTypePriority
CVE-2026-26107SQL Server8.8Privilege EscalationCritical — patch now
CVE-2026-26082.NET Framework7.5Denial of ServiceHigh
CVE-2026-26110Microsoft Office8.0RCE via Preview PaneCritical — patch now
CVE-2026-26113Microsoft Office7.8RCE via Preview PaneCritical — patch now
CVE-2026-26144Microsoft Excel6.5Information DisclosureMedium

CVE-2026-26107: An authorized attacker can escalate to SQLAdmin over the network without physical access. If SQL Server is reachable from a compromised endpoint, this is lateral movement made trivial.

Priority Areas for Defenders

1. Office Preview-Pane RCE

Preview-pane exploitation lowers the bar significantly — a user doesn't need to open the file. Prioritize Office patches for finance, HR, legal, and executive support teams who receive external attachments daily.

Compensating controls while patch validation runs:

  • Enable attachment sandboxing / CDR (content disarm and reconstruct)
  • Block macro-capable file types at the email gateway
  • Monitor Office process spawning child processes

2. SQL Server Privilege Escalation

Elevating to SQLAdmin from an authorized low-privilege account is a bridge to broader compromise: data exfiltration, persistence via SQL Agent jobs, and lateral movement into connected systems.

Immediate actions:

  1. Audit which accounts have SQL Server access and from where
  2. Enable SQL Server audit logging if not already active
  3. Restrict SQL Server port (1433) to known application servers only

3. Excel Copilot Data Egress

CVE-2026-26144 is a reminder that AI-assisted workflows are now inside the attack surface. If Copilot can move data across trust zones, validate outbound policies from workstations handling sensitive spreadsheets.

  1. Patch Office and SQL Server endpoints first — highest attacker interest, broad enterprise exposure
  2. Review email attachment controls — preview-pane RCE makes attachment handling a first-line control
  3. Audit SQL privilege paths — identify where low-privilege accounts can escalate
  4. Check Copilot/AI egress boundaries — review outbound connections from Office-enabled systems

Conclusion

March 2026 Patch Tuesday reflects a pattern: traditional vulnerabilities now intersect with AI tooling, cloud-connected administration, and deeply embedded business workflows. Remediation requires understanding how a single flaw might influence identity, data flow, and endpoint trust simultaneously.

Sources

FAQ

FAQ

Written by

Lucas Oliveira

Research

A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.