Microsoft patches two publicly disclosed zero-days in March security update

March 22, 20262 min read2 sources
Share:
Microsoft patches two publicly disclosed zero-days in March security update

Microsoft’s March Patch Tuesday fixed 79 vulnerabilities, including two zero-days that were publicly disclosed before patches were available. The two most closely watched flaws were CVE-2024-21412, a Windows SmartScreen security feature bypass, and CVE-2024-26198, an elevation-of-privilege bug in Microsoft Office.

CVE-2024-21412 affects SmartScreen, the Windows protection that warns users before opening files or applications considered risky. A bypass of that feature can make phishing-delivered malware more likely to run without the warning prompts users would normally see. CVE-2024-26198 impacts Microsoft Office and is notable because Office remains a common entry point in email-based attacks. Public reporting tied the issue to internet shortcut and file-handling behavior, and Microsoft indicated it had been exploited in the wild.

The immediate concern for defenders is timing. Once technical details of a flaw are public, attackers can work from the same information as security teams, shortening the window for safe testing and staged rollout. That is especially relevant here because the two bugs touch components widely used in phishing chains: Windows file warnings and Office document handling.

Beyond the zero-days, Microsoft’s March release also included several high-severity remote code execution issues across Windows and related products. But the publicly disclosed flaws are likely to get priority in many patch queues because they were already exposed before fixes shipped.

Organizations should move quickly to deploy the updates, particularly on user-facing Windows systems and endpoints where staff routinely open email attachments, downloaded files, or shortcut links. Security teams may also want to review attachment filtering, endpoint protection policies, SmartScreen enforcement, and user guidance around suspicious files and links. For remote users connecting over public networks, layered protections such as a VPN can help reduce exposure, though patching remains the main fix.

Microsoft’s Security Update Guide lists the affected CVEs and exploit status, while industry coverage has highlighted the increased risk that comes with pre-patch disclosure.

Share:

// SOURCES

// RELATED

NIST scales back vulnerability data enrichment after 263% surge in submissions

NIST is limiting detailed analysis in its National Vulnerability Database (NVD) due to a massive increase in submissions, impacting security teams.

2 min readApr 18

Three Microsoft Defender zero-days actively exploited; two still unpatched

Security firm Huntress warns of active exploitation of three Microsoft Defender zero-days, codenamed BlueHammer, RedSun, and UnDefend. Two remain unpa

6 min readApr 18

London healthcare faces months of disruption after ransomware attack on key supplier

A major ransomware attack on pathology provider Synnovis has caused severe, ongoing disruption to London hospitals, highlighting critical supply chain

6 min readApr 18

Most 'AI SOCs' are just faster triage, and that's not enough

Many AI security tools only speed up alert analysis, failing to reduce analyst workload. Experts argue real gains require AI that automates response a

2 min readApr 17