Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Fixes 84 Security Flaws, Including Two Zero-Days

Microsoft Fixes 84 Security Flaws, Including Two Zero-Days

Posted on March 11, 2026 By CWS

On Tuesday, Microsoft announced the release of patches addressing 84 new security vulnerabilities across its software products, including two critical zero-day flaws that have been publicly disclosed. Out of these, eight vulnerabilities are deemed Critical, while the remaining 76 are categorized as Important. The update addresses a range of issues, including privilege escalation, remote code execution, information disclosure, spoofing, denial-of-service, and security feature bypass.

Key Vulnerabilities and Their Impact

This month’s update also includes fixes for 10 vulnerabilities in Microsoft’s Chromium-based Edge browser, following the February 2026 Patch Tuesday release. Among the two publicly known zero-days, CVE-2026-26127 is a denial-of-service flaw in .NET with a CVSS score of 7.5, and CVE-2026-21262 is an elevation of privilege issue in SQL Server scoring 8.8.

The highest CVSS rated vulnerability patched this month is a critical remote code execution flaw, CVE-2026-21536, in the Microsoft Devices Pricing Program, with a score of 9.8. Microsoft has confirmed that this vulnerability has been fully mitigated, requiring no user intervention. The discovery of this flaw is credited to the AI-powered XBOW platform.

Focus on Privilege Escalation Flaws

Privilege escalation bugs accounted for over half of the vulnerabilities addressed this month, with six marked as more likely to be exploited across several Windows components. These types of vulnerabilities are often leveraged by attackers post-compromise to gain elevated permissions on a system. Notably, the Winlogon flaw, CVE-2026-25187, allows attackers to exploit improper link resolution for SYSTEM-level access, as identified by Google Project Zero’s James Forshaw.

The Winlogon vulnerability, due to its low complexity and lack of user interaction requirements, poses a significant threat once initial access is gained. Additionally, CVE-2026-26118, a server-side request forgery vulnerability in Azure’s Model Context Protocol server, could enable attackers to escalate privileges over a network by exploiting the MCP server’s managed identity token.

Addressing Critical Information Disclosure

Among the Critical vulnerabilities patched, an information disclosure issue in Excel, CVE-2026-26144, stands out. This flaw involves cross-site scripting due to improper input neutralization during web page generation. Exploitation could lead to data exfiltration via Copilot Agent mode, posing significant risks in environments where Excel files contain sensitive information.

According to Alex Vovk, CEO of Action1, such vulnerabilities are particularly concerning in corporate settings where confidential data could be extracted without triggering alerts. Organizations using AI-assisted productivity features may face additional exposure, as automated processes could inadvertently share sensitive information.

In response to these security challenges, Microsoft is enhancing the default behavior of Windows Autopatch by implementing hotpatch security updates. This change, effective from May 2026, aims to accelerate patch deployment, achieving up to 90% compliance in half the time without necessitating restarts.

Through these updates, Microsoft continues to prioritize the security and integrity of its software, addressing both immediate threats and implementing long-term protective measures.

The Hacker News Tags:Cybersecurity, information disclosure, Microsoft, Patch Tuesday, privilege escalation, remote code execution, security patches, software updates, Windows Autopatch, zero-day vulnerabilities

Post navigation

Previous Post: UNC6426 Leverages npm Flaw for Rapid AWS Admin Access
Next Post: BlackSanta Malware Disables Security Before Attack

Related Posts

Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT The Hacker News
RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers The Hacker News
Why BAS Is Proof of Defense, Not Assumptions Why BAS Is Proof of Defense, Not Assumptions The Hacker News
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks The Hacker News
CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation The Hacker News
Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • BlackSanta Malware Disables Security Before Attack
  • Microsoft Fixes 84 Security Flaws, Including Two Zero-Days
  • UNC6426 Leverages npm Flaw for Rapid AWS Admin Access
  • Critical Microsoft .NET Vulnerability Demands Immediate Attention
  • Siemens and Schneider Lead ICS Patch Tuesday Updates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • BlackSanta Malware Disables Security Before Attack
  • Microsoft Fixes 84 Security Flaws, Including Two Zero-Days
  • UNC6426 Leverages npm Flaw for Rapid AWS Admin Access
  • Critical Microsoft .NET Vulnerability Demands Immediate Attention
  • Siemens and Schneider Lead ICS Patch Tuesday Updates

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News