BigTech CompaniesCybersecurityNewswireTechnology

Microsoft Patches Critical Zero-Day Exploits

▼ Summary

– Microsoft’s March Patch Tuesday addressed 79 vulnerabilities, including two publicly disclosed zero-days.
– One zero-day, CVE-2026-21262, is a high-severity SQL Server flaw requiring low-level privileges for elevation of privilege (EoP) attacks.
– The second zero-day, CVE-2026-26127, is a .NET denial-of-service flaw that could enable attacks by disrupting security monitoring.
– Only three of the month’s vulnerabilities were rated critical, with the vast majority being EoP flaws.
– Despite the known risks, many SQL Server instances remain exposed online, increasing potential attack surfaces.

In a significant security update, Microsoft has addressed a total of 79 vulnerabilities during its latest Patch Tuesday cycle. This month’s release includes patches for two publicly disclosed zero-day exploits, underscoring the ongoing need for prompt system updates. While the overall count is lower than some previous months, the presence of these actively exploited flaws demands immediate attention from IT and security teams.

The first of these zero-days, tracked as CVE-2026-21262, is an elevation of privilege vulnerability within SQL Server. It carries a substantial CVSS score of 8.8, placing it just below the critical severity threshold primarily because some existing low-level privileges are needed for initial access. Security experts warn against underestimating this flaw. Despite Microsoft assessing its likelihood of exploitation as less likely, the public disclosure means threat actors are aware of the weakness. Many organizations have long recognized the danger of exposing SQL Server instances directly to the internet. However, internet scans still reveal tens of thousands of such systems, making them potential targets for attackers looking to leverage this new privilege escalation path.

The second disclosed zero-day is identified as CVE-2026-26127, a denial-of-service vulnerability affecting the .NET framework. The potential impact here could be more severe than a simple service interruption. If this flaw is exploited against a log forwarder or a security monitoring agent, it could create a temporary blind spot in an organization’s defenses. An attacker could seize that moment of “artificial darkness” to launch further attacks without being logged or detected. Even a basic attack causing downtime could result in breached service level agreements, financial loss, or emergency after-hours work for response teams.

While only three vulnerabilities this month received a critical severity rating, two for remote code execution and one for information disclosure, the most common type of flaw addressed is elevation of privilege. These EoP vulnerabilities are a critical stepping stone for attackers, allowing them to gain higher-level system permissions after establishing an initial foothold. Security professionals emphasize that patching these issues is essential to breaking the attack chain and preventing limited access from turning into a full-scale breach.

Cybersecurity engineers are advising organizations to prioritize the deployment of these updates, particularly for systems hosting SQL Server or utilizing the .NET framework. The combination of public disclosure and the privileged nature of the targeted services creates a tangible risk window that closes only once patches are applied. A proactive and timely update strategy remains the most effective defense against exploits targeting these newly corrected weaknesses.

(Source: InfoSecurity Magazine)

Topics

patch tuesday 95% security vulnerabilities 93% zero-day vulnerabilities 90% security updates 90% elevation of privilege 88% exploitation risk 87% critical vulnerabilities 85% sql server security 85% system administration 83% denial of service 82%