
New Delhi, March 11, 2026: In its latest monthly security rollout, Microsoft has released patches for 84 vulnerabilities as part of the March 2026 “Patch Tuesday.” This update addresses a wide spectrum of security risks across the Windows ecosystem, including critical remote code execution (RCE) flaws, privilege escalation bugs, and two publicly disclosed “zero-day” vulnerabilities.
While the sheer number of patches is significant, security experts note that none of the flaws have been actively exploited in the wild yet. However, the presence of critical vulnerabilities in widely used software like Microsoft Office and SQL Server makes immediate updating essential for both enterprise environments and home users.
Out of the 84 vulnerabilities addressed, eight are classified as Critical, while 76 are rated as Important. The update covers a diverse range of products, including Windows, Office, Azure, SQL Server, and the Chromium-based Edge browser.
The vulnerability types include:
Microsoft highlighted two vulnerabilities that were publicly known prior to the release of the patches, often referred to as zero-days. Although there is no evidence of active exploitation, their public nature increases the risk of hackers developing working exploits.
A landmark development in this month’s update is the inclusion of CVE-2026-21536, a critical RCE flaw in the Microsoft Devices Pricing Program with a near-perfect CVSS score of 9.8.
This vulnerability is notable because it was discovered by XBOW, an autonomous AI-powered vulnerability discovery platform. This marks one of the first instances where an AI agent has identified a high-severity flaw in a major vendor’s software, signaling a shift in how vulnerabilities will be found and patched in the future. Microsoft has confirmed that this issue has been fully mitigated on their side.
Office users are urged to patch immediately due to several RCE flaws (CVE-2026-26110 and CVE-2026-26113) that can be triggered through the Preview Pane. This means a user does not even need to open a malicious document to be compromised; simply viewing the file in a preview window could execute malicious code with the user’s privileges.
To stay protected against these newly disclosed threats, users and organizations should: