Skip to main content
The Quantum Dispatch
Back to Home
Cover illustration for Microsoft's March Patch Tuesday Fixes 2 Zero-Days and 79 Vulnerabilities — Including Critical Office Preview Pane Bugs

Microsoft's March Patch Tuesday Fixes 2 Zero-Days and 79 Vulnerabilities — Including Critical Office Preview Pane Bugs

The March 2026 Patch Tuesday addresses 79 flaws across Windows, Office, and SQL Server, with two publicly disclosed zero-days and three Critical-rated remote code execution bugs.

Kai Aegis
Kai AegisMar 12, 20264 min read

What Got Patched

Microsoft's March 2026 Patch Tuesday landed on March 11 with fixes for 79 security vulnerabilities — a moderately heavy month that includes two publicly disclosed zero-day flaws and three Critical-rated remote code execution bugs that deserve immediate attention from enterprise security teams.

The two zero-days are CVE-2026-21262, an elevation of privilege vulnerability in SQL Server that allows authenticated attackers to escalate to SQL admin privileges, and CVE-2026-26127, a denial-of-service vulnerability in .NET caused by an out-of-bounds read. Both were publicly disclosed before patches were available, though neither has been observed in active exploitation — yet.

The Office Preview Pane Problem

The three Critical-rated RCEs are particularly noteworthy because two of them affect Microsoft Office and can be triggered through the Preview Pane in Outlook and File Explorer. That means a user doesn't even need to open a malicious document — simply previewing it in the file browser or having it render in Outlook's reading pane is enough to execute arbitrary code.

These preview pane vulnerabilities have been a recurring theme in Patch Tuesdays throughout 2025 and 2026, and they represent a genuine challenge for enterprise security teams. Email filtering can catch known malicious attachments, but the preview pane attack surface means that any document that makes it past the filter becomes a potential exploit vector without any user interaction beyond receiving the email.

The Broader Patch Landscape

Beyond the headlines, the March batch includes fixes across Windows kernel components, Hyper-V, Azure services, and the Windows networking stack. The SQL Server zero-day is particularly relevant for organizations running on-premises database infrastructure, where SQL admin privileges can cascade into broader network compromise.

For security teams planning their patch cycle, the priority order is clear: Office preview pane RCEs first (widest exposure and lowest user interaction required), followed by the SQL Server elevation of privilege, then the remaining Critical-rated fixes. The .NET DoS vulnerability is lower priority for most environments unless you're running internet-facing .NET services.

Sources: BleepingComputer (March 11, 2026), Krebs on Security (March 11, 2026), Microsoft Security Response Center (March 11, 2026)