Friday, March 13, 2026
๐Ÿ›ก๏ธ
Adaptive Perspectives, 7-day Insights
Technology

Microsoft's March 2026 Patch Tuesday: 83 Flaws and a Copilot Exploit

Microsoft's quietest Patch Tuesday in six months addresses 83 vulnerabilities with no active exploits โ€” but a critical Excel flaw that weaponizes Copilot for zero-click data theft deserves attention.

Microsoft's March 2026 Patch Tuesday: 83 Flaws and a Copilot Exploit
Image generated by OpenAI GPT Image 1.5

Note: This post was written by Claude Opus 4.6. The following is a synthesis of reporting from major security news organizations.

Microsoft’s March 2026 Patch Tuesday addresses 83 vulnerabilities across Windows, Office, Azure, SQL Server, and .NET โ€” and for the first time in six months, none are under active exploitation. After February’s six actively exploited zero-days, it’s a welcome breather. But buried in the update is a critical Excel flaw that turns Microsoft’s own Copilot into a data exfiltration tool.

The Zero-Days (Bark, No Bite)

Two vulnerabilities were publicly disclosed before patches dropped, but neither is being exploited in the wild.

CVE-2026-21262 โ€” SQL Server Elevation of Privilege (CVSS 8.8). An authenticated attacker can exploit improper access controls to escalate from a regular database user to sysadmin. Both traditional SQL Server and Azure-based IaaS instances are affected. Microsoft rates exploitation as “Less Likely.”

CVE-2026-26127 โ€” .NET Denial of Service (CVSS 7.5). An out-of-bounds read in .NET 9.0 and 10.0 allows an unauthenticated attacker to crash applications over the network. Affects Windows, macOS, and Linux. Microsoft rates exploitation as “Unlikely.”

Tenable’s Satnam Narang summed them up: “These bugs are more bark than bite.”

Copilot as Attack Vector

The most interesting vulnerability this month isn’t a zero-day โ€” it’s CVE-2026-26144, a critical information disclosure flaw in Microsoft Excel (CVSS 7.5).

The bug is a cross-site scripting vulnerability that can weaponize Copilot Agent mode into exfiltrating data via unintended network egress. No user interaction required โ€” just network access. An attacker could silently extract spreadsheet contents at the logged-on user’s privilege level without triggering obvious alerts.

Zero Day Initiative’s Dustin Childs called it “fascinating,” noting it represents “an attack scenario we’re likely to see more often.” Action1 CEO Alex Vovk warned that the implications are amplified in corporate environments “where Excel files often contain financial data, intellectual property, or operational records.”

Combined with February’s three Copilot RCE vulnerabilities, a pattern is emerging: AI-powered productivity tools are becoming reliable attack surfaces.

Office Preview Pane: Still a Problem

CVE-2026-26110 and CVE-2026-26113 are both critical remote code execution flaws in Microsoft Office (CVSS 8.4 each). Both can be triggered through the Preview Pane โ€” meaning a user doesn’t need to open the file, just preview it in Outlook or Explorer.

Childs expressed fatigue with the recurring pattern: “I’ve lost count of how many of these bugs have been patched over the last year, but it’s just a matter of time until they start appearing in active exploits.” Action1’s Mike Walters added that documents spreading via email and collaboration platforms could “give attackers a foothold inside the organization.”

CVE-2026-23669 is a remote code execution flaw in the Windows Print Spooler (CVSS 8.8). A use-after-free in spoolsv.exe lets an authenticated attacker send specially crafted messages to execute arbitrary code with SYSTEM privileges. Every supported version of Windows is affected.

Childs didn’t mince words: “Just reading the title makes me twitch with remembrances of Print Nightmare from a few years ago.”

Azure MCP Server: Token Theft via SSRF

CVE-2026-26118 is a server-side request forgery vulnerability in Azure’s Model Context Protocol server (CVSS 8.8). An authenticated attacker can submit a malicious URL in place of a normal Azure resource identifier, tricking the MCP server into sending its managed identity token to an attacker-controlled endpoint. That token grants whatever privileges the server’s managed identity holds.

The Full Breakdown

CategoryCount
Elevation of Privilege46
Remote Code Execution18
Information Disclosure11
Denial of Service4
Spoofing4
Security Feature Bypass2

Six vulnerabilities are rated “Exploitation More Likely” by Microsoft: CVE-2026-23668 (Graphics Component), CVE-2026-24289 and CVE-2026-26132 (Windows Kernel), CVE-2026-24291 (Accessibility Infrastructure), CVE-2026-24294 (SMB Server), and CVE-2026-25187 (Winlogon). All six are elevation of privilege flaws leading to SYSTEM access.

Known Issues

Microsoft says it is not aware of significant issues with the March updates. A minor issue exists where updates installed via the Windows Update Standalone Installer (WUSA) may fail when run from a shared network folder.

Recommendations

This is a relatively calm month โ€” use it to catch up. No active exploitation means patch teams have room to test before deploying, but the six “Exploitation More Likely” flaws shouldn’t be left waiting.

Priority order:

  1. CVE-2026-26110 and CVE-2026-26113 (Office RCE via Preview Pane) โ€” these will be weaponized
  2. CVE-2026-23669 (Print Spooler RCE) โ€” anything Print Spooler deserves urgency
  3. CVE-2026-26144 (Excel/Copilot data theft) โ€” novel attack path for corporate environments
  4. CVE-2026-26118 (Azure MCP Server) โ€” organizations using Azure MCP should patch immediately
  5. The six “Exploitation More Likely” EoP flaws โ€” all lead to SYSTEM, all are local post-compromise paths

Dustin Childs summed up the month best: the absence of active zero-days is “a nice change from last month.” Don’t waste the window.

Sources