Microsoft’s March Security Update of High-Risk Vulnerability Notice for Multiple Products

Microsoft’s March Security Update of High-Risk Vulnerability Notice for Multiple Products

March 30, 2026 | NSFOCUS

Overview

On March 11, NSFOCUS CERT detected that Microsoft released the March Security Update patch, which fixed 83 security issues involving widely used products such as Windows, Microsoft Office, Microsoft SQL Server, Azure, etc., including high-risk vulnerability types such as privilege escalation and remote code execution.

Among the vulnerabilities fixed by Microsoft’s monthly update this month, there are 8 critical vulnerabilities and 75 important vulnerabilities.

Please update the patch as soon as possible for protection. For a complete list of vulnerabilities, please refer to the appendix.

Reference link: https://msrc.microsoft.com/update-guide/releaseNote/2026-Mar

Key Vulnerabilities

Based on the product popularity and vulnerability importance, this update contains vulnerabilities with greater impact. Relevant users are requested to pay special attention:

Microsoft Office Remote Code Execution Vulnerability (CVE-2026-26110):

A remote code execution vulnerability exists in Microsoft Office. Due to type confusion issues in Microsoft Office, an unauthenticated attacker can access resources through incompatible data types, and the user preview pane will trigger arbitrary code execution. CVSS score 8.4.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26110

Microsoft Office Remote Code Execution Vulnerability (CVE-2026-26113):

A remote code execution vulnerability exists in Microsoft Office. Due to the untrusted pointer dereference problem that Microsoft Office is dealing with, an unauthenticated attacker can send a specially crafted malicious file to the user, which will cause arbitrary code execution after the user previews or clicks it. CVSS score 8.4.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26113

Microsoft Excel Information Disclosure Vulnerability (CVE-2026-26144):

There is an information disclosure vulnerability in Microsoft Excel. Because Microsoft Excel fails to correctly process the input data during the web page generation process, it leads to cross-site scripting attacks. Unauthenticated attackers can obtain sensitive information through the Copilot Agent mode. CVSS score 7.5.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26144

Windows Print Spooler Remote Code Execution Vulnerability (CVE-2026-23669):

Windows Print Spooler has a remote code execution vulnerability. Because Windows Print Spooler allows use-after-free reuse (use-after-free), an authenticated attacker can execute arbitrary code over the network. CVSS score 8.8.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23669

Windows SMB Server Privilege Escalation Vulnerability (CVE-2026-24294):

A privilege escalation vulnerability exists in Windows SMB Server, which allows an authenticated local attacker to elevate privileges to SYSTEM due to improper authentication issues in the Windows SMB server. CVSS score 7.8.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24294

Windows Graphics Component Privilege Escalation Vulnerability (CVE-2026-23668):

A privilege escalation vulnerability exists in the Windows Graphics Component. Due to a flawed synchronization mechanism when using shared resources in Microsoft Graphics Component, an authenticated attacker can elevate privileges to SYSTEM through conditional competition. CVSS score 7.0.

Official announcement link:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23668

Scope of Impact

The following are the affected product versions of some key vulnerabilities. For the scope of products affected by other vulnerabilities, please refer to the official announcement link.

Vulnerability NumberAffected product versions
CVE-2026-26110Microsoft Office for Android
Microsoft Office 2016 (64-bit edition)
Microsoft Office 2016 (32-bit edition)
Microsoft Office LTSC for Mac 2024
Microsoft Office LTSC 2024 for 64-bit editions
Microsoft Office LTSC 2024 for 32-bit editions
Microsoft Office LTSC 2021 for 32-bit editions
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Office LTSC for Mac 2021
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for 32-bit editions
CVE-2026-26113Microsoft Office 2016 (64-bit edition)
Microsoft Office 2016 (32-bit edition)
Microsoft Office LTSC for Mac 2024
Microsoft Office LTSC 2024 for 64-bit editions
Microsoft Office LTSC 2024 for 32-bit editions
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Office LTSC for Mac 2021
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for 32-bit editions
Microsoft SharePoint Server 2019
Microsoft SharePoint Server Subscription Edition
Microsoft SharePoint Enterprise Server 2016
CVE-2026-26144Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft 365 Apps for Enterprise for 64-bit Systems
CVE-2026-23669 CVE-2026-24294Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2025
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems
Windows 11 Version 25H2 for ARM64-based Systems
Windows Server 2025 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 11 version 26H1 for x64-based Systems
Windows 11 Version 26H1 for ARM64-based Systems
CVE-2026-23668Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems

Mitigation

At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link:

https://msrc.microsoft.com/update-guide/releaseNote/2026-Mar

Note: Patch updates for Windows Update may fail due to network problems, computer environment problems, etc. After installing the patch, users should check whether the patch has been successfully updated in time.

Right-click the Windows icon, select “Settings (N)”, select “Update and Security”-“Windows Update”, view the prompt information on this page, or click “View Update History” to view the historical update status.

For updates that have not been successfully installed, you can click the update name to jump to the Microsoft official download page. It is recommended that users click the link on this page and go to the “Microsoft Update” website to download the independent program package and install it.

Appendix: Vulnerability List

Affected productsCVE No.Vulnerability TitleSeverity
Microsoft OfficeCVE-2026-26113Microsoft Office Remote Code Execution VulnerabilityCritical
AzureCVE-2026-23651Microsoft ACI Confidential Containers Privilege Escalation VulnerabilityCritical
DeviceCVE-2026-21536Microsoft Devices Pricing Program Remote Code Execution VulnerabilityCritical
AzureCVE-2026-26124Microsoft ACI Confidential Containers Privilege Escalation VulnerabilityCritical
OtherCVE-2026-26125Payment Orchestrator Service privilege escalation vulnerabilityCritical
AzureCVE-2026-26122Microsoft ACI Confidential Containers Information Disclosure VulnerabilityCritical
Microsoft OfficeCVE-2026-26110Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2026-26144Microsoft Excel Information Disclosure VulnerabilityCritical
Microsoft SQL ServerCVE-2026-21262SQL Server Privilege Escalation VulnerabilityImportant
AzureCVE-2026-23660Windows Admin Center in Azure Portal Privilege Escalation VulnerabilityImportant
AzureCVE-2026-23664Azure IoT Explorer information disclosure vulnerabilityImportant
WindowsCVE-2026-23667Broadcast DVR Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-23668Windows Graphics Component Escalation VulnerabilityImportant
WindowsCVE-2026-23669Windows Print Spooler Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-23671Windows Bluetooth RFCOM Protocol Driver Escalation VulnerabilityImportant
WindowsCVE-2026-23672Windows Universal Disk Format File System Driver (UDFS) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-23673Windows Resilient File System (ReFS) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-24282Push message Routing Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-24283Multiple UNC Provider Kernel Driver privilege escalation vulnerabilityImportant
Microsoft Office,WindowsCVE-2026-24285Win32k Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-24287Windows Kernel privilege escalation vulnerabilityImportant
WindowsCVE-2026-24288Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-24289Windows Kernel privilege escalation vulnerabilityImportant
WindowsCVE-2026-24290Windows Projected File System Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-24291Windows Accessibility Infrastructure (ATBroker.exe) Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-24292Windows Connected Devices Platform Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-24293Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-24294Windows SMB Server Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-24295Windows Device Association Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-24296Windows Device Association Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-24297Windows Kerberos security feature bypass vulnerabilityImportant
WindowsCVE-2026-25165Performance Counters for Windows privilege escalation vulnerabilitiesImportant
WindowsCVE-2026-25166Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-25167Microsoft Brokering File System Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-25168Windows Graphics Component Denial of Service VulnerabilityImportant
WindowsCVE-2026-25169Windows Graphics Component Denial of Service VulnerabilityImportant
WindowsCVE-2026-25170Windows Hyper-V privilege escalation vulnerabilityImportant
WindowsCVE-2026-25171Windows Authentication privilege escalation vulnerabilityImportant
WindowsCVE-2026-25172Windows Routing and Remote Access Service (RRAS) remote code execution vulnerabilityImportant
WindowsCVE-2026-25173Windows Routing and Remote Access Service (RRAS) remote code execution vulnerabilityImportant
WindowsCVE-2026-25174Windows Extensible File Allocation Table Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-25175Windows NTFS privilege escalation vulnerabilityImportant
WindowsCVE-2026-25176Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-25177Active Directory Domain Services privilege escalation vulnerabilityImportant
WindowsCVE-2026-25178Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-25179Windows Ancillary Function Driver for WinSock Privilege Escalation VulnerabilityImportant
Microsoft Office,WindowsCVE-2026-25180Windows Graphics Component Information Disclosure VulnerabilityImportant
WindowsCVE-2026-25181GDI+ information leakage vulnerabilityImportant
WindowsCVE-2026-25185Windows Shell Link Data Processing Spoofing VulnerabilityImportant
WindowsCVE-2026-25186Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure VulnerabilityImportant
WindowsCVE-2026-25187Winlogon Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-25188Windows Telephony Service privilege escalation vulnerabilityImportant
WindowsCVE-2026-25189Windows DWM Core Library privilege escalation vulnerabilityImportant
WindowsCVE-2026-25190GDI remote code execution vulnerabilityImportant
Microsoft OfficeCVE-2026-26105Microsoft SharePoint Server Spoofing VulnerabilityImportant
WindowsCVE-2026-26111Windows Routing and Remote Access Service (RRAS) remote code execution vulnerabilityImportant
Microsoft OfficeCVE-2026-26112Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2026-26114Microsoft SharePoint Server Remote Code Execution VulnerabilityImportant
WindowsCVE-2026-23656Windows App Installer spoofing vulnerabilityImportant
System CenterCVE-2026-20967System Center Operations Manager (SCOM) privilege escalation vulnerabilityImportant
AzureCVE-2026-26121Azure IOT Explorer spoofing vulnerabilityImportant
Microsoft SQL ServerCVE-2026-26115SQL Server Privilege Escalation VulnerabilityImportant
Microsoft SQL ServerCVE-2026-26116SQL Server Privilege Escalation VulnerabilityImportant
WindowsCVE-2026-26128Windows SMB Server Privilege Escalation VulnerabilityImportant
.NET 10.0 installed on LinuxCVE-2026-26131.NET privilege escalation vulnerabilityImportant
WindowsCVE-2026-26132Windows Kernel privilege escalation vulnerabilityImportant
Microsoft OfficeCVE-2026-26134Microsoft Office privilege escalation vulnerabilityImportant
Microsoft.Bcl.Memory,
.NET 9.0 installed on Windows,
.NET 10.0 installed on Windows,
.NET 9.0 installed on Mac OS,
.NET 10.0 installed on Linux,
.NET 10.0 installed on Mac OS,
.NET 9.0 installed on Linux
CVE-2026-26127.NET Denial of Service VulnerabilityImportant
WindowsCVE-2026-23674MapUrlToZone security feature bypass vulnerabilityImportant
AzureCVE-2026-26148Microsoft Azure AD SSH Login extension for Linux privilege escalation vulnerabilityImportant
Open Source SoftwareCVE-2026-23654GitHub: Zero Shot SCFoundation Remote Code Execution VulnerabilityImportant
AzureCVE-2026-23661Azure IoT Explorer information disclosure vulnerabilityImportant
AzureCVE-2026-23662Azure IoT Explorer information disclosure vulnerabilityImportant
AzureCVE-2026-23665Linux Azure Diagnostic extension (LAD) privilege escalation vulnerabilityImportant
Microsoft OfficeCVE-2026-26106Microsoft SharePoint Server Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2026-26107Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2026-26108Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2026-26109Microsoft Excel Remote Code Execution VulnerabilityImportant
AzureCVE-2026-26117Arc Enabled Servers-Azure Connected Machine Agent privilege escalation vulnerabilityImportant
AzureCVE-2026-26118Azure MCP Server Tools privilege escalation vulnerabilityImportant
AppsCVE-2026-26123Microsoft Authenticator Information Disclosure VulnerabilityImportant
ASP.NET CoreCVE-2026-26130ASP.NET Core denial of service vulnerabilityImportant
AzureCVE-2026-26141Hybrid Worker Extension (Arcenabled‑ Windows VMs) Privilege Escalation VulnerabilityImportant

Statement

This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.

About NSFOCUS

NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.

Founded in 2000, NSFOCUS operates globally with over 4000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world’s top ten telecommunications companies.

Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.