Forwarded from the National Cybersecurity Information Sharing and Analysis Center: Cybersecurity Alert NISAC-200-202603-00000009
[Content Description]
Microsoft released its March 2016 security update, patching 84 vulnerabilities including those in SQL Server, Microsoft Office SharePoint, and Active Directory Domain Services. Among these are 16 high-risk vulnerabilities with a CVSS score of 8.8. Please identify and patch them as soon as possible.
[Influence Platform]
The affected software and services are as follows:
Active Directory Domain Services
ASP.NET Core
Azure Arc
Azure Compute Gallery
Azure Entra ID
Azure IoT Explorer
Azure Linux Virtual Machines
Azure MCP Server
Azure Portal Windows Admin Center
Azure Windows Virtual Machine Agent
Broadcast DVR
Connected Devices Platform Service (Cdpsvc)
GitHub Repo: zero-shot-scfoundation
Microsoft Authenticator
Microsoft Brokering File System
Microsoft Devices Pricing Program
Microsoft Graphics Component
Microsoft Office
Microsoft Office Excel
Microsoft Office SharePoint
.NET
Payment Orchestrator Service
Push Message Routing Service
Role: Windows Hyper-V
SQL Server
System Center Operations Manager
Windows Accessibility Infrastructure (ATBroker.exe)
Windows Ancillary Function Driver for WinSock
Windows App Installer
Windows Authentication Methods
Windows Bluetooth RFCOM Protocol Driver
Windows Device Association Service
Windows DWM Core Library
Windows Extensible File Allocation
Windows File Server
Windows GDI
Windows GDI+
Windows Kerberos
Windows Kernel
Windows MapUrlToZone
Windows Mobile Broadband
Windows NTFS
Windows Performance Counters
Windows Print Spooler Components
Windows Projected File System
Windows Resilient File System (ReFS)
Windows Routing and Remote Access Service (RRAS)
Windows Shell Link Processing
Windows SMB Server
Windows System Image Manager
Windows Telephony Service
Windows Universal Disk Format File System Driver (UDFS)
Windows Win32K
Winlogon
[Recommended Actions]
Microsoft has released a patch to fix this vulnerability. Please update as soon as possible or contact your system maintenance vendor. For detailed information, please refer to the official Microsoft link: https://msrc.microsoft.com/update-guide/releaseNote/2026-Mar