Skip to main content

Microsoft security update summary's for March 2026

  • March 5, 2026
  • 9 replies
  • 162 views

TripleHelix
Moderator
Forum|alt.badge.img+63

CVEs have been published or revised in the Security Update Guide

March 5, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-21536

  • Title: Microsoft Devices Pricing Program Remote Code Execution Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 5, 2026
  • Last updated: March 5, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-23651

  • Title: Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 5, 2026
  • Last updated: March 5, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-26122

  • Title: Microsoft ACI Confidential Containers Information Disclosure Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 5, 2026
  • Last updated: March 5, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-26124

  • Title: Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 5, 2026
  • Last updated: March 5, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-26125

  • Title: Payment Orchestrator Service Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 5, 2026
  • Last updated: March 5, 2026
  • Aggregate CVE severity rating: Critical

Customer action required: No

9 replies

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • March 10, 2026

Patch Tuesday!

 

March 2026 Security Updates

 

This release consists of the following 83 Microsoft CVEs:

Tag CVE Base Score CVSS Vector Exploitability FAQs? Workarounds? Mitigations?
System Center Operations Manager CVE-2026-20967 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
SQL Server CVE-2026-21262 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Microsoft Devices Pricing Program CVE-2026-21536 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Azure Compute Gallery CVE-2026-23651 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Exploitation Less Likely Yes No No
GitHub Repo: zero-shot-scfoundation CVE-2026-23654 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Windows App Installer CVE-2026-23656 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Azure Portal Windows Admin Center CVE-2026-23660 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Azure IoT Explorer CVE-2026-23661 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Azure IoT Explorer CVE-2026-23662 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Azure IoT Explorer CVE-2026-23664 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Azure Linux Virtual Machines CVE-2026-23665 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Broadcast DVR CVE-2026-23667 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Microsoft Graphics Component CVE-2026-23668 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation More Likely Yes No No
Windows Print Spooler Components CVE-2026-23669 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Bluetooth RFCOM Protocol Driver CVE-2026-23671 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Universal Disk Format File System Driver (UDFS) CVE-2026-23672 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Windows Resilient File System (ReFS) CVE-2026-23673 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Windows MapUrlToZone CVE-2026-23674 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Push Message Routing Service CVE-2026-24282 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows File Server CVE-2026-24283 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Win32K CVE-2026-24285 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Kernel CVE-2026-24287 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Mobile Broadband CVE-2026-24288 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Kernel CVE-2026-24289 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation More Likely Yes No No
Windows Projected File System CVE-2026-24290 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Accessibility Infrastructure (ATBroker.exe) CVE-2026-24291 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation More Likely Yes No No
Connected Devices Platform Service (Cdpsvc) CVE-2026-24292 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Ancillary Function Driver for WinSock CVE-2026-24293 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows SMB Server CVE-2026-24294 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation More Likely Yes No No
Windows Device Association Service CVE-2026-24295 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Device Association Service CVE-2026-24296 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Windows Kerberos CVE-2026-24297 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Performance Counters CVE-2026-25165 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Windows System Image Manager CVE-2026-25166 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Microsoft Brokering File System CVE-2026-25167 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Microsoft Graphics Component CVE-2026-25168 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C Exploitation Less Likely No No No
Microsoft Graphics Component CVE-2026-25169 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C Exploitation Less Likely No No No
Role: Windows Hyper-V CVE-2026-25170 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Authentication Methods CVE-2026-25171 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Routing and Remote Access Service (RRAS) CVE-2026-25172 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Routing and Remote Access Service (RRAS) CVE-2026-25173 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Extensible File Allocation CVE-2026-25174 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Windows NTFS CVE-2026-25175 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Ancillary Function Driver for WinSock CVE-2026-25176 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Active Directory Domain Services CVE-2026-25177 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Ancillary Function Driver for WinSock CVE-2026-25178 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Ancillary Function Driver for WinSock CVE-2026-25179 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Microsoft Graphics Component CVE-2026-25180 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows GDI+ CVE-2026-25181 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Shell Link Processing CVE-2026-25185 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Accessibility Infrastructure (ATBroker.exe) CVE-2026-25186 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Winlogon CVE-2026-25187 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation More Likely Yes No No
Windows Telephony Service CVE-2026-25188 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Windows DWM Core Library CVE-2026-25189 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows GDI CVE-2026-25190 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Microsoft Office SharePoint CVE-2026-26105 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Microsoft Office SharePoint CVE-2026-26106 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Microsoft Office Excel CVE-2026-26107 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Microsoft Office Excel CVE-2026-26108 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Microsoft Office Excel CVE-2026-26109 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Microsoft Office CVE-2026-26110 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Routing and Remote Access Service (RRAS) CVE-2026-26111 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Microsoft Office Excel CVE-2026-26112 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Microsoft Office CVE-2026-26113 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Microsoft Office SharePoint CVE-2026-26114 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
SQL Server CVE-2026-26115 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
SQL Server CVE-2026-26116 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Azure Windows Virtual Machine Agent CVE-2026-26117 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Azure MCP Server CVE-2026-26118 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Azure IoT Explorer CVE-2026-26121 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C Exploitation Less Likely No No No
Azure Compute Gallery CVE-2026-26122 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Microsoft Authenticator CVE-2026-26123 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Azure Compute Gallery CVE-2026-26124 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Exploitation Less Likely Yes No No
Payment Orchestrator Service CVE-2026-26125 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C N/A Yes No No
.NET CVE-2026-26127 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C Exploitation Unlikely No No No
Windows SMB Server CVE-2026-26128 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
ASP.NET Core CVE-2026-26130 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C Exploitation Less Likely No No No
.NET CVE-2026-26131 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Windows Kernel CVE-2026-26132 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation More Likely Yes No No
Microsoft Office CVE-2026-26134 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Less Likely Yes No No
Azure Arc CVE-2026-26141 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Microsoft Office Excel CVE-2026-26144 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C Exploitation Unlikely Yes No No
Azure Entra ID CVE-2026-26148 8.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C Exploitation Unlikely Yes No No

 

https://msrc.microsoft.com/update-guide/releaseNote/2026-Mar


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • March 10, 2026

Microsoft security update summary for March 2026

March 10, 2026

Here’s a summary of Microsoft security updates released on this date.

Critical security updates

  • Microsoft 365 Apps for Enterprise for 32-bit Systems
  • Microsoft 365 Apps for Enterprise for 64-bit Systems
  • Microsoft Office 2016 (32-bit edition)
  • Microsoft Office 2016 (64-bit edition)
  • Microsoft Office 2019 for 32-bit editions
  • Microsoft Office 2019 for 64-bit editions
  • Microsoft Office for Android
  • Microsoft Office LTSC 2021 for 32-bit editions
  • Microsoft Office LTSC 2021 for 64-bit editions
  • Microsoft Office LTSC 2024 for 32-bit editions
  • Microsoft Office LTSC 2024 for 64-bit editions
  • Microsoft Office LTSC for Mac 2021
  • Microsoft Office LTSC for Mac 2024
  • Microsoft SharePoint Enterprise Server 2016
  • Microsoft SharePoint Server 2019
  • Microsoft SharePoint Server Subscription Edition

Important security updates

  • .NET 10.0 installed on Linux
  • .NET 10.0 installed on Mac OS
  • .NET 10.0 installed on Windows
  • .NET 9.0 installed on Linux
  • .NET 9.0 installed on Mac OS
  • .NET 9.0 installed on Windows
  • Arc Enabled Servers - Azure Connected Machine Agent
  • ASP.NET Core 10.0
  • ASP.NET Core 8.0
  • ASP.NET Core 9.0
  • Azure Automation Hybrid Worker Windows Extension
  • Azure IoT Explorer
  • Azure Linux Virtual Machines with Azure Diagnostics extension
  • Azure MCP Server Tools
  • GitHub Repo: Zero Shot scFoundation
  • Microsoft Authenticator for Android
  • Microsoft Authenticator for IOS
  • Microsoft Azure AD SSH Login extension for Linux
  • Microsoft Excel 2016 (32-bit edition)
  • Microsoft Excel 2016 (64-bit edition)
  • Microsoft Semantic Kernel Python SDK
  • Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR)
  • Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack
  • Microsoft SQL Server 2017 for x64-based Systems (CU 31)
  • Microsoft SQL Server 2017 for x64-based Systems (GDR)
  • Microsoft SQL Server 2019 for x64-based Systems (CU 32)
  • Microsoft SQL Server 2019 for x64-based Systems (GDR)
  • Microsoft SQL Server 2022 for x64-based Systems (CU 23)
  • Microsoft SQL Server 2022 for x64-based Systems (GDR)
  • Microsoft SQL Server 2025 for x64-based Systems (CU2)
  • Microsoft SQL Server 2025 for x64-based Systems (GDR)
  • Microsoft.Bcl.Memory 10.0
  • Microsoft.Bcl.Memory 9.0
  • Office Online Server
  • System Center Operations Manager 2019
  • System Center Operations Manager 2022
  • System Center Operations Manager 2025
  • Windows 10 Version 1607 for 32-bit Systems
  • Windows 10 Version 1607 for x64-based Systems
  • Windows 10 Version 1809 for 32-bit Systems
  • Windows 10 Version 1809 for x64-based Systems
  • Windows 10 Version 21H2 for 32-bit Systems
  • Windows 10 Version 21H2 for ARM64-based Systems
  • Windows 10 Version 21H2 for x64-based Systems
  • Windows 10 Version 22H2 for 32-bit Systems
  • Windows 10 Version 22H2 for ARM64-based Systems
  • Windows 10 Version 22H2 for x64-based Systems
  • Windows 11 Version 23H2 for ARM64-based Systems
  • Windows 11 Version 23H2 for x64-based Systems
  • Windows 11 Version 24H2 for ARM64-based Systems
  • Windows 11 Version 24H2 for x64-based Systems
  • Windows 11 Version 25H2 for ARM64-based Systems
  • Windows 11 Version 25H2 for x64-based Systems
  • Windows 11 Version 26H1 for ARM64-based Systems
  • Windows 11 version 26H1 for x64-based Systems
  • Windows Admin Center in Azure Portal
  • Windows App Client for Windows Desktop
  • Windows Server 2012
  • Windows Server 2012 (Server Core installation)
  • Windows Server 2012 R2
  • Windows Server 2012 R2 (Server Core installation)
  • Windows Server 2016
  • Windows Server 2016 (Server Core installation)
  • Windows Server 2019
  • Windows Server 2019 (Server Core installation)
  • Windows Server 2022
  • Windows Server 2022 (Server Core installation)
  • Windows Server 2022, 23H2 Edition (Server Core installation)
  • Windows Server 2025
  • Windows Server 2025 (Server Core installation)

No action required security updates

  • Microsoft ACI Confidential Containers
  • Microsoft Devices Pricing Program
  • Payment Orchestrator Service
 

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • March 12, 2026

CVEs have been published or revised in the Security Update Guide

March 11, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-3537

  • Title: Chromium: CVE-2026-3537 Object lifecycle issue in PowerVR
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 11, 2026
  • Last updated: March 11, 2026
  • Aggregate CVE severity rating:

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • March 12, 2026

CVEs have been published or revised in the Security Update Guide

March 12, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-26133

  • Title: M365 Copilot Information Disclosure Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 12, 2026
  • Last updated: March 12, 2026
  • Aggregate CVE severity rating: Important
  • Customer action required: Yes

CVE-2026-3537

  • Title: Chromium: CVE-2026-3537 Object lifecycle issue in PowerVR
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 11, 2026
  • Last updated: March 11, 2026
  • Aggregate CVE severity rating:

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • March 13, 2026

CVEs have been published or revised in the Security Update Guide

March 13, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-0385

  • Title: Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating: Low
  • Customer action required: Yes

CVE-2026-3910

  • Title: Chromium: CVE-2026-3910 Inappropriate implementation in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3913

  • Title: Chromium: CVE-2026-3913 Heap buffer overflow in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3914

  • Title: Chromium: CVE-2026-3914 Integer overflow in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3915

  • Title: Chromium: CVE-2026-3915 Heap buffer overflow in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3916

  • Title: Chromium: CVE-2026-3916 Out of bounds read in Web Speech
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3917

  • Title: Chromium: CVE-2026-3917 Use after free in Agents
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3918

  • Title: Chromium: CVE-2026-3918 Use after free in WebMCP
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3919

  • Title: Chromium: CVE-2026-3919 Use after free in Extensions
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3920

  • Title: Chromium: CVE-2026-3920 Out of bounds memory access in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3921

  • Title: Chromium: CVE-2026-3921 Use after free in TextEncoding
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3922

  • Title: Chromium: CVE-2026-3922 Use after free in MediaStream
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3923

  • Title: Chromium: CVE-2026-3923 Use after free in WebMIDI
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3924

  • Title: Chromium: CVE-2026-3924 Use after free in WindowDialog
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3925

  • Title: Chromium: CVE-2026-3925 Incorrect security UI in LookalikeChecks
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3926

  • Title: Chromium: CVE-2026-3926 Out of bounds read in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3927

  • Title: Chromium: CVE-2026-3927 Incorrect security UI in PictureInPicture
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3928

  • Title: Chromium: CVE-2026-3928 Insufficient policy enforcement in Extensions
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3929

  • Title: Chromium: CVE-2026-3929 Side-channel information leakage in ResourceTiming
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3930

  • Title: Chromium: CVE-2026-3930 Unsafe navigation in Navigation
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3931

  • Title: Chromium: CVE-2026-3931 Heap buffer overflow in Skia
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3932

  • Title: Chromium: CVE-2026-3932 Insufficient policy enforcement in PDF
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3934

  • Title: Chromium: CVE-2026-3934 Insufficient policy enforcement in ChromeDriver
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3935

  • Title: Chromium: CVE-2026-3935 Incorrect security UI in WebAppInstalls
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3936

  • Title: Chromium: CVE-2026-3936 Use after free in WebView
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3937

  • Title: Chromium: CVE-2026-3937 Incorrect security UI in Downloads
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3938

  • Title: Chromium: CVE-2026-3938 Insufficient policy enforcement in Clipboard
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3939

  • Title: Chromium: CVE-2026-3939 Use after free in WebView
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3940

  • Title: Chromium: CVE-2026-3940 Insufficient policy enforcement in DevTools
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3941

  • Title: Chromium: CVE-2026-3941 Insufficient policy enforcement in DevTools
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3942

  • Title: Chromium: CVE-2026-3942 Incorrect security UI in PictureInPicture
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • March 16, 2026

CVEs have been published or revised in the Security Update Guide

March 16, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-0385

  • Title: Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating: Low
  • Customer action required: Yes

CVE-2026-3909

  • Title: Chromium: CVE-2026-3909 Out of bounds write in Skia
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 16, 2026
  • Last updated: March 16, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3910

  • Title: Chromium: CVE-2026-3910 Inappropriate implementation in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3913

  • Title: Chromium: CVE-2026-3913 Heap buffer overflow in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3914

  • Title: Chromium: CVE-2026-3914 Integer overflow in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3915

  • Title: Chromium: CVE-2026-3915 Heap buffer overflow in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3916

  • Title: Chromium: CVE-2026-3916 Out of bounds read in Web Speech
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3917

  • Title: Chromium: CVE-2026-3917 Use after free in Agents
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3918

  • Title: Chromium: CVE-2026-3918 Use after free in WebMCP
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3919

  • Title: Chromium: CVE-2026-3919 Use after free in Extensions
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3920

  • Title: Chromium: CVE-2026-3920 Out of bounds memory access in WebML
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3921

  • Title: Chromium: CVE-2026-3921 Use after free in TextEncoding
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3922

  • Title: Chromium: CVE-2026-3922 Use after free in MediaStream
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3923

  • Title: Chromium: CVE-2026-3923 Use after free in WebMIDI
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3924

  • Title: Chromium: CVE-2026-3924 Use after free in WindowDialog
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3925

  • Title: Chromium: CVE-2026-3925 Incorrect security UI in LookalikeChecks
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3926

  • Title: Chromium: CVE-2026-3926 Out of bounds read in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3927

  • Title: Chromium: CVE-2026-3927 Incorrect security UI in PictureInPicture
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3928

  • Title: Chromium: CVE-2026-3928 Insufficient policy enforcement in Extensions
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3929

  • Title: Chromium: CVE-2026-3929 Side-channel information leakage in ResourceTiming
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3930

  • Title: Chromium: CVE-2026-3930 Unsafe navigation in Navigation
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3931

  • Title: Chromium: CVE-2026-3931 Heap buffer overflow in Skia
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3932

  • Title: Chromium: CVE-2026-3932 Insufficient policy enforcement in PDF
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3934

  • Title: Chromium: CVE-2026-3934 Insufficient policy enforcement in ChromeDriver
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3935

  • Title: Chromium: CVE-2026-3935 Incorrect security UI in WebAppInstalls
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3936

  • Title: Chromium: CVE-2026-3936 Use after free in WebView
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3937

  • Title: Chromium: CVE-2026-3937 Incorrect security UI in Downloads
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3938

  • Title: Chromium: CVE-2026-3938 Insufficient policy enforcement in Clipboard
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3939

  • Title: Chromium: CVE-2026-3939 Use after free in WebView
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3940

  • Title: Chromium: CVE-2026-3940 Insufficient policy enforcement in DevTools
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3941

  • Title: Chromium: CVE-2026-3941 Insufficient policy enforcement in DevTools
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-3942

  • Title: Chromium: CVE-2026-3942 Incorrect security UI in PictureInPicture
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 13, 2026
  • Last updated: March 13, 2026
  • Aggregate CVE severity rating:

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • March 19, 2026

CVEs have been published or revised in the Security Update Guide

March 19, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-23658

  • Title: Azure DevOps: msazure Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 19, 2026
  • Last updated: March 19, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-23659

  • Title: Azure Data Factory Information Disclosure Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 19, 2026
  • Last updated: March 19, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-24299

  • Title: M365 Copilot Information Disclosure Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 19, 2026
  • Last updated: March 19, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-26120

  • Title: Microsoft Bing Tampering Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 19, 2026
  • Last updated: March 19, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-26136

  • Title: Microsoft Copilot Information Disclosure Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 19, 2026
  • Last updated: March 19, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-26137

  • Title: Microsoft 365 Copilot BizChat Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 19, 2026
  • Last updated: March 19, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-26138

  • Title: Microsoft Purview Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 19, 2026
  • Last updated: March 19, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-26139

  • Title: Microsoft Purview Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 19, 2026
  • Last updated: March 19, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-32169

  • Title: Azure Cloud Shell Elevation of Privilege Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 19, 2026
  • Last updated: March 19, 2026
  • Aggregate CVE severity rating: Critical
  • Customer action required: No

CVE-2026-32191

  • Title: Microsoft Bing Images Remote Code Execution Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 19, 2026
  • Last updated: March 19, 2026
  • Aggregate CVE severity rating: Critical

Customer action required: No


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • March 23, 2026

CVEs have been published or revised in the Security Update Guide

March 23, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-4440

  • Title: Chromium: CVE-2026-4440 Out of bounds read and write in WebGL
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 22, 2026
  • Last updated: March 22, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4441

  • Title: Chromium: CVE-2026-4441 Use after free in Base
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4443

  • Title: Chromium: CVE-2026-4443 Heap buffer overflow in WebAudio
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4444

  • Title: Chromium: CVE-2026-4444 Stack buffer overflow in WebRTC
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4445

  • Title: Chromium: CVE-2026-4445 Use after free in WebRTC
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4446

  • Title: Chromium: CVE-2026-4446 Use after free in WebRTC
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4447

  • Title: Chromium: CVE-2026-4447 Inappropriate implementation in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4448

  • Title: Chromium: CVE-2026-4448 Heap buffer overflow in ANGLE
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4449

  • Title: Chromium: CVE-2026-4449 Use after free in Blink
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4450

  • Title: Chromium: CVE-2026-4450 Out of bounds write in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4451

  • Title: Chromium: CVE-2026-4451 Insufficient validation of untrusted input in Navigation
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4452

  • Title: Chromium: CVE-2026-4452 Integer overflow in ANGLE
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4454

  • Title: Chromium: CVE-2026-4454 Use after free in Network
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4455

  • Title: Chromium: CVE-2026-4455 Heap buffer overflow in PDFium
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4456

  • Title: Chromium: CVE-2026-4456 Use after free in Digital Credentials API
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4457

  • Title: Chromium: CVE-2026-4457 Type Confusion in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4458

  • Title: Chromium: CVE-2026-4458 Use after free in Extensions
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4460

  • Title: Chromium: CVE-2026-4460 Out of bounds read in Skia
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4461

  • Title: Chromium: CVE-2026-4461 Inappropriate implementation in V8
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4462

  • Title: Chromium: CVE-2026-4462 Out of bounds read in Blink
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4463

  • Title: Chromium: CVE-2026-4463 Heap buffer overflow in WebRTC
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4464

  • Title: Chromium: CVE-2026-4464 Integer overflow in ANGLE
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 23, 2026
  • Last updated: March 23, 2026
  • Aggregate CVE severity rating:

Customer action required: Yes


TripleHelix
Moderator
Forum|alt.badge.img+63
  • Author
  • Moderator
  • March 27, 2026

CVEs have been published or revised in the Security Update Guide

March 27, 2026

These common vulnerabilities and exposures (CVEs) were recently published or revised in the Microsoft Security Update Guide:

CVE-2026-32187

  • Title: Microsoft Edge (Chromium-based) Defense in Depth Vulnerability
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 27, 2026
  • Last updated: March 27, 2026
  • Aggregate CVE severity rating: Low
  • Customer action required: Yes

CVE-2026-4442

  • Title: Chromium: CVE-2026-4442 Heap buffer overflow in CSS
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 27, 2026
  • Last updated: March 27, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4453

  • Title: Chromium: CVE-2026-4453 Integer overflow in Dawn
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 20, 2026
  • Last updated: March 20, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4459

  • Title: Chromium: CVE-2026-4459 Out of bounds read and write in WebAudio
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 20, 2026
  • Last updated: March 20, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4673

  • Title: Chromium: CVE-2026-4673 Heap buffer overflow in WebAudio
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 27, 2026
  • Last updated: March 27, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4674

  • Title: Chromium: CVE-2026-4674 Out of bounds read in CSS
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 27, 2026
  • Last updated: March 27, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4675

  • Title: Chromium: CVE-2026-4675 Heap buffer overflow in WebGL
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 27, 2026
  • Last updated: March 27, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4677

  • Title: Chromium: CVE-2026-4677 Out of bounds read in WebAudio
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 27, 2026
  • Last updated: March 27, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4679

  • Title: Chromium: CVE-2026-4679 Integer overflow in Fonts
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 27, 2026
  • Last updated: March 27, 2026
  • Aggregate CVE severity rating:
  • Customer action required: Yes

CVE-2026-4680

  • Title: Chromium: CVE-2026-4680 Use after free in FedCM
  • Version: 1.0
  • Reason for revision: Information published.
  • Originally released: March 27, 2026
  • Last updated: March 27, 2026
  • Aggregate CVE severity rating:

Customer action required: Yes