Microsoft выпустила очередной набор патчей. В это раз корпорация включила заплатки для 79 уязвимостей, включая две публично раскрытые 0-day, о которых уже было известно до выхода патча. При этом данных об их использовании в реальных атаках Microsoft не привела.
В этот раз в списке оказались уязвимости самых разных классов: 46 багов повышения привилегий, 18 уязвимостей удалённого выполнения кода, 10 проблем раскрытия информации, а также ошибки, связанные с отказом в обслуживании, подменой и обходом защитных механизмов.
Отдельно отмечается, что в мартовский набор вошли и три критические уязвимости.
Обе 0-day, на которые в первую очередь обратили внимание, выглядят по-разному.
Первая — CVE-2026-21262 в SQL Server. Она связана с повышением привилегий и, по описанию Microsoft, позволяет аутентифицированному атакующему получить повышенные права по сети — вплоть до уровня SQLAdmin.
Вторая — CVE-2026-26127 в .NET, это уже уязвимость, связанная с выходом за границы чтения и приводящая к отказу в обслуживании. Обе проблемы были публично раскрыты до выпуска исправлений.
Кроме 0-day, Microsoft отдельно закрыла и две уязвимости удалённого выполнения кода в Microsoft Office — CVE-2026-26110 и CVE-2026-26113. Их неприятная особенность в том, что они могут сработать через область предварительного просмотра.
Ещё одна любопытная история — CVE-2026-26144 в Microsoft Excel. По описанию Microsoft, эта уязвимость может использоваться для утечки данных через Microsoft Copilot.
Список всех закрытых дыр приводим в таблице ниже:
| Затронутый компонент | CVE-идентификатор | CVE-наименование | Степень риска |
| .NET | CVE-2026-26131 | .NET Elevation of Privilege Vulnerability | Важная |
| .NET | CVE-2026-26127 | .NET Denial of Service Vulnerability | Важная |
| Active Directory Domain Services | CVE-2026-25177 | Active Directory Domain Services Elevation of Privilege Vulnerability | Важная |
| ASP.NET Core | CVE-2026-26130 | ASP.NET Core Denial of Service Vulnerability | Важная |
| Azure Arc | CVE-2026-26141 | Hybrid Worker Extension (Arc-enabled Windows VMs) Elevation of Privilege Vulnerability | Важная |
| Azure Compute Gallery | CVE-2026-23651 | Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability | Критическая |
| Azure Compute Gallery | CVE-2026-26124 | Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability | Критическая |
| Azure Compute Gallery | CVE-2026-26122 | Microsoft ACI Confidential Containers Information Disclosure Vulnerability | Критическая |
| Azure Entra ID | CVE-2026-26148 | Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability | Важная |
| Azure IoT Explorer | CVE-2026-26121 | Azure IOT Explorer Spoofing Vulnerability | Важная |
| Azure IoT Explorer | CVE-2026-23662 | Azure IoT Explorer Information Disclosure Vulnerability | Важная |
| Azure IoT Explorer | CVE-2026-23661 | Azure IoT Explorer Information Disclosure Vulnerability | Важная |
| Azure IoT Explorer | CVE-2026-23664 | Azure IoT Explorer Information Disclosure Vulnerability | Важная |
| Azure Linux Virtual Machines | CVE-2026-23665 | Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability | Важная |
| Azure MCP Server | CVE-2026-26118 | Azure MCP Server Tools Elevation of Privilege Vulnerability | Важная |
| Azure Portal Windows Admin Center | CVE-2026-23660 | Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability | Важная |
| Azure Windows Virtual Machine Agent | CVE-2026-26117 | Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability | Важная |
| Broadcast DVR | CVE-2026-23667 | Broadcast DVR Elevation of Privilege Vulnerability | Важная |
| Connected Devices Platform Service (Cdpsvc) | CVE-2026-24292 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability | Важная |
| GitHub Repo: zero-shot-scfoundation | CVE-2026-23654 | GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability | Важная |
| Mariner | CVE-2026-23235 | f2fs: fix out-of-bounds access in sysfs attribute read/write | Важная |
| Mariner | CVE-2026-23234 | f2fs: fix to avoid UAF in f2fs_write_end_io() | Важная |
| Mariner | CVE-2026-3713 | pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-based overflow | Важная |
| Mariner | CVE-2026-23237 | platform/x86: classmate-laptop: Add missing NULL pointer checks | Важная |
| Mariner | CVE-2026-26017 | CoreDNS ACL Bypass | Важная |
| Mariner | CVE-2026-26018 | CoreDNS Loop Detection Denial of Service Vulnerability | Важная |
| Mariner | CVE-2026-2297 | SourcelessFileLoader does not use io.open_code() | Важная |
| Mariner | CVE-2026-0038 | In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | Важная |
| Mariner | CVE-2026-27601 | Underscore.js has unlimited recursion in _.flatten and _.isEqual, potential for DoS attack | Важная |
| Mariner | CVE-2026-23236 | fbdev: smscufx: properly copy ioctl memory to kernelspace | Важная |
| Mariner | CVE-2026-23865 | An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2. | Важная |
| Mariner | CVE-2025-71238 | scsi: qla2xxx: Fix bsg_done() causing double free | Важная |
| Mariner | CVE-2026-3338 | PKCS7_verify Signature Validation Bypass in AWS-LC | Важная |
| Mariner | CVE-2026-23231 | netfilter: nf_tables: fix use-after-free in nf_tables_addchain() | Важная |
| Mariner | CVE-2026-3381 | Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib | Критическая |
| Mariner | CVE-2026-0031 | In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | Важная |
| Mariner | CVE-2026-23238 | romfs: check sb_set_blocksize() return value | Важная |
| Mariner | CVE-2026-3494 | MariaDB Server Audit Plugin Comment Handling Bypass | Важная |
| Mariner | CVE-2026-3336 | PKCS7_verify Certificate Chain Validation Bypass in AWS-LC | Важная |
| Mariner | CVE-2026-0032 | In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | Важная |
| Microsoft Authenticator | CVE-2026-26123 | Microsoft Authenticator Information Disclosure Vulnerability | Важная |
| Microsoft Brokering File System | CVE-2026-25167 | Microsoft Brokering File System Elevation of Privilege Vulnerability | Важная |
| Microsoft Devices Pricing Program | CVE-2026-21536 | Microsoft Devices Pricing Program Remote Code Execution Vulnerability | Критическая |
| Microsoft Edge (Chromium-based) | CVE-2026-3544 | Chromium: CVE-2026-3544 Heap buffer overflow in WebCodecs | Неизвестно |
| Microsoft Edge (Chromium-based) | CVE-2026-3540 | Chromium: CVE-2026-3540 Inappropriate implementation in WebAudio | Неизвестно |
| Microsoft Edge (Chromium-based) | CVE-2026-3536 | Chromium: CVE-2026-3536 Integer overflow in ANGLE | Неизвестно |
| Microsoft Edge (Chromium-based) | CVE-2026-3538 | Chromium: CVE-2026-3538 Integer overflow in Skia | Неизвестно |
| Microsoft Edge (Chromium-based) | CVE-2026-3545 | Chromium: CVE-2026-3545 Insufficient data validation in Navigation | Неизвестно |
| Microsoft Edge (Chromium-based) | CVE-2026-3541 | Chromium: CVE-2026-3541 Inappropriate implementation in CSS | Неизвестно |
| Microsoft Edge (Chromium-based) | CVE-2026-3543 | Chromium: CVE-2026-3543 Inappropriate implementation in V8 | Неизвестно |
| Microsoft Edge (Chromium-based) | CVE-2026-3539 | Chromium: CVE-2026-3539 Object lifecycle issue in DevTools | Неизвестно |
| Microsoft Edge (Chromium-based) | CVE-2026-3542 | Chromium: CVE-2026-3542 Inappropriate implementation in WebAssembly | Неизвестно |
| Microsoft Graphics Component | CVE-2026-25169 | Windows Graphics Component Denial of Service Vulnerability | Важная |
| Microsoft Graphics Component | CVE-2026-25180 | Windows Graphics Component Information Disclosure Vulnerability | Важная |
| Microsoft Graphics Component | CVE-2026-25168 | Windows Graphics Component Denial of Service Vulnerability | Важная |
| Microsoft Graphics Component | CVE-2026-23668 | Windows Graphics Component Elevation of Privilege Vulnerability | Важная |
| Microsoft Office | CVE-2026-26110 | Microsoft Office Remote Code Execution Vulnerability | Критическая |
| Microsoft Office | CVE-2026-26113 | Microsoft Office Remote Code Execution Vulnerability | Критическая |
| Microsoft Office | CVE-2026-26134 | Microsoft Office Elevation of Privilege Vulnerability | Важная |
| Microsoft Office Excel | CVE-2026-26144 | Microsoft Excel Information Disclosure Vulnerability | Критическая |
| Microsoft Office Excel | CVE-2026-26109 | Microsoft Excel Remote Code Execution Vulnerability | Важная |
| Microsoft Office Excel | CVE-2026-26108 | Microsoft Excel Remote Code Execution Vulnerability | Важная |
| Microsoft Office Excel | CVE-2026-26107 | Microsoft Excel Remote Code Execution Vulnerability | Важная |
| Microsoft Office Excel | CVE-2026-26112 | Microsoft Excel Remote Code Execution Vulnerability | Важная |
| Microsoft Office SharePoint | CVE-2026-26105 | Microsoft SharePoint Server Spoofing Vulnerability | Важная |
| Microsoft Office SharePoint | CVE-2026-26114 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Важная |
| Microsoft Office SharePoint | CVE-2026-26106 | Microsoft SharePoint Server Remote Code Execution Vulnerability | Важная |
| Microsoft Semantic Kernel Python SDK | CVE-2026-26030 | GitHub: CVE-2026-26030 Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable | Важная |
| Payment Orchestrator Service | CVE-2026-26125 | Payment Orchestrator Service Elevation of Privilege Vulnerability | Критическая |
| Push Message Routing Service | CVE-2026-24282 | Push message Routing Service Elevation of Privilege Vulnerability | Важная |
| Role: Windows Hyper-V | CVE-2026-25170 | Windows Hyper-V Elevation of Privilege Vulnerability | Важная |
| SQL Server | CVE-2026-21262 | SQL Server Elevation of Privilege Vulnerability | Важная |
| SQL Server | CVE-2026-26116 | SQL Server Elevation of Privilege Vulnerability | Важная |
| SQL Server | CVE-2026-26115 | SQL Server Elevation of Privilege Vulnerability | Важная |
| System Center Operations Manager | CVE-2026-20967 | System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability | Важная |
| Windows Accessibility Infrastructure (ATBroker.exe) | CVE-2026-25186 | Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability | Важная |
| Windows Accessibility Infrastructure (ATBroker.exe) | CVE-2026-24291 | Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability | Важная |
| Windows Ancillary Function Driver for WinSock | CVE-2026-25179 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Важная |
| Windows Ancillary Function Driver for WinSock | CVE-2026-24293 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Важная |
| Windows Ancillary Function Driver for WinSock | CVE-2026-25176 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Важная |
| Windows Ancillary Function Driver for WinSock | CVE-2026-25178 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Важная |
| Windows App Installer | CVE-2026-23656 | Windows App Installer Spoofing Vulnerability | Важная |
| Windows Authentication Methods | CVE-2026-25171 | Windows Authentication Elevation of Privilege Vulnerability | Важная |
| Windows Bluetooth RFCOM Protocol Driver | CVE-2026-23671 | Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability | Важная |
| Windows Device Association Service | CVE-2026-24296 | Windows Device Association Service Elevation of Privilege Vulnerability | Важная |
| Windows Device Association Service | CVE-2026-24295 | Windows Device Association Service Elevation of Privilege Vulnerability | Важная |
| Windows DWM Core Library | CVE-2026-25189 | Windows DWM Core Library Elevation of Privilege Vulnerability | Важная |
| Windows Extensible File Allocation | CVE-2026-25174 | Windows Extensible File Allocation Table Elevation of Privilege Vulnerability | Важная |
| Windows File Server | CVE-2026-24283 | Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability | Важная |
| Windows GDI | CVE-2026-25190 | GDI Remote Code Execution Vulnerability | Важная |
| Windows GDI+ | CVE-2026-25181 | GDI+ Information Disclosure Vulnerability | Важная |
| Windows Kerberos | CVE-2026-24297 | Windows Kerberos Security Feature Bypass Vulnerability | Важная |
| Windows Kernel | CVE-2026-26132 | Windows Kernel Elevation of Privilege Vulnerability | Важная |
| Windows Kernel | CVE-2026-24289 | Windows Kernel Elevation of Privilege Vulnerability | Важная |
| Windows Kernel | CVE-2026-24287 | Windows Kernel Elevation of Privilege Vulnerability | Важная |
| Windows MapUrlToZone | CVE-2026-23674 | MapUrlToZone Security Feature Bypass Vulnerability | Важная |
| Windows Mobile Broadband | CVE-2026-24288 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | Важная |
| Windows NTFS | CVE-2026-25175 | Windows NTFS Elevation of Privilege Vulnerability | Важная |
| Windows Performance Counters | CVE-2026-25165 | Performance Counters for Windows Elevation of Privilege Vulnerability | Важная |
| Windows Print Spooler Components | CVE-2026-23669 | Windows Print Spooler Remote Code Execution Vulnerability | Важная |
| Windows Projected File System | CVE-2026-24290 | Windows Projected File System Elevation of Privilege Vulnerability | Важная |
| Windows Resilient File System (ReFS) | CVE-2026-23673 | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | Важная |
| Windows Routing and Remote Access Service (RRAS) | CVE-2026-26111 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Важная |
| Windows Routing and Remote Access Service (RRAS) | CVE-2026-25173 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Важная |
| Windows Routing and Remote Access Service (RRAS) | CVE-2026-25172 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Важная |
| Windows Shell Link Processing | CVE-2026-25185 | Windows Shell Link Processing Spoofing Vulnerability | Важная |
| Windows SMB Server | CVE-2026-26128 | Windows SMB Server Elevation of Privilege Vulnerability | Важная |
| Windows SMB Server | CVE-2026-24294 | Windows SMB Server Elevation of Privilege Vulnerability | Важная |
| Windows System Image Manager | CVE-2026-25166 | Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability | Важная |
| Windows Telephony Service | CVE-2026-25188 | Windows Telephony Service Elevation of Privilege Vulnerability | Важная |
| Windows Universal Disk Format File System Driver (UDFS) | CVE-2026-23672 | Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability | Важная |
| Windows Win32K | CVE-2026-24285 | Win32k Elevation of Privilege Vulnerability | Важная |
| Winlogon | CVE-2026-25187 | Winlogon Elevation of Privilege Vulnerability | Важная |








