Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Microsoft patches zero-days in .NET and SQL Server | Computer Weekly

By Computer Weekly by By Computer Weekly
March 10, 2026
Home Uncategorized
Share on FacebookShare on Twitter


Two zero-day flaws in the form of a denial of service (DoS) issue in .NET and an elevation of privilege (EoP) issues in SQL Server top the agenda for security teams in Microsoft’s latest monthly Patch Tuesday update.

Tracked as CVE-2026-26127 and CVE-2026-21262 and carrying CVSS scores of 7.5 and 8.8 respectively, both vulnerabilities have already been made public, but neither of them is known to be exploited at the point of release, although this will not be the case for much longer.

CVE-2026-26127 arises thanks to an out-of-bounds read condition in .NET that enables an unauthenticated attacker to deny service over the network. Microsoft said that in its estimation, exploitation was frankly unlikely. CVE-2026-21262 is the result of improper access controls and is only exploitable by a threat actor who is already authorised on the network – as such Microsoft said exploitation is less likely.

However, in the opinion of Rapid7 senior software engineer Adam Barnett, in both of these instances Microsoft’s assessment may understate the potential impact of the two flaws.

“Attackers fond of low-effort denial of service attacks against .NET applications will be checking out CVE-2026-26127 today,” said Barnett. “Microsoft is aware of public disclosure. While the immediate impact of exploitation is likely contained to denial of service by triggering a crash, opportunities for other types of attacks might emerge during a service reboot.”

For example, he explained, should a log forwarder or security agent be impacted, an attacker could use this to cover up a more damaging attack, and even if they simply cause downtime, this can still be enough to cause service level agreement (SLA) breaches or revenue impacts, or, noted Barnett, cause someone to get paged while asleep.

Meanwhile, CVE-2026-21262, he said, is not “just any EoP vulnerability”.

“Microsoft is aware of public disclosure, so while they assess the likelihood of exploitation as less likely, it would be a courageous defender who shrugged and deferred the patches for this one,” said Barnett.

“Most SQL Server admins and security teams concluded many years ago that exposing SQL Server directly to the internet was not a good idea. Then again, popular search engines for internet-connected devices describe tens of thousands of SQL Server instances, and they can’t all be honeypots.”

Should an attacker obtain SQL Server admin rights, beyond stealing or fiddling with the database, they could also target for example the xp_cmdshell function – this is a stored procedure that spawns a Windows command shell in order to execute operating system commands. This function is disabled by default but can be easily enabled by an administrator, at which point the attacker would basically be able to act with the full privileges of the target instance’s security context.

Critical flaws draw attention

This month’s Patch Tuesday update also brings a total of eight critically rated vulnerabilities from Microsoft, three of them affecting Microsoft ACI Confidential Containers. This group also includes three remote code execution (RCE) vulnerabilities, two in Microsoft Office and one in the Microsoft Devices Pricing Programme.

The two Microsoft Office RCE flaws are CVE-2026-26110, which arises from a type confusion issue in which the application accesses a resource using an incompatible data type, causing incorrect memory handling, and CVE-2026-26113, which arises from an untrusted pointer dereference issue in which Office incorrectly handles memory pointers, enabling an attacker to manipulate how the application accesses memory.

“Remote code execution vulnerabilities in productivity software represent a high-risk threat for organisations,” said Jack Bicer, vulnerability research director at Action1. “If exploited, attackers could gain control of employee systems, deploy ransomware, steal sensitive documents, or establish persistent access within corporate networks.

“Because Office documents are frequently shared internally and externally, malicious files could spread quickly across organisations, potentially turning a single compromised system into an entry point for wider network compromise. 

Bicer added: “If the security update cannot be applied immediately, organisations should disable the Preview Pane in file explorers and restrict the opening of Office files from untrusted sources. Implementing email filtering, attachment scanning, and endpoint protection monitoring can also reduce the risk of malicious document delivery.”



Source link

By Computer Weekly

By Computer Weekly

Next Post
Enterprise Connect 2026: The AI-Powered Innovations From Mitel, RingCentral, Zoom And More

Enterprise Connect 2026: The AI-Powered Innovations From Mitel, RingCentral, Zoom And More

Recommended.

OtterBox Ready to Protect iPhone 17 and iPhone Air Devices with Full Portfolio of Cases

OtterBox Ready to Protect iPhone 17 and iPhone Air Devices with Full Portfolio of Cases

September 9, 2025
Mont Phelps, Who Built NWN Into A CRN Solution Provider 500 Powerhouse, Mourned As Channel Titan With Heart, Humor And Humanity

Mont Phelps, Who Built NWN Into A CRN Solution Provider 500 Powerhouse, Mourned As Channel Titan With Heart, Humor And Humanity

December 16, 2025

Trending.

Spirit of openness helps banks get serious about stopping scams | Computer Weekly

Spirit of openness helps banks get serious about stopping scams | Computer Weekly

April 10, 2025
Microsoft Q3 Earnings Preview: What To Watch On Azure, Copilot, OpenAI

Microsoft Q3 Earnings Preview: What To Watch On Azure, Copilot, OpenAI

April 29, 2026
Weibo Publishes 2025 Environmental, Social and Governance Report

Weibo Publishes 2025 Environmental, Social and Governance Report

April 28, 2026
It Takes 2 Minutes to Hack the EU’s New Age-Verification App

It Takes 2 Minutes to Hack the EU’s New Age-Verification App

April 18, 2026
Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

Chunghwa Telecom 2025 Form 20-F filed with the U.S. SEC

April 15, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio