Home / Blog / Recast Blog / March 2026 Third-Party Vulnerabilities and Patches 

March 2026 Third-Party Vulnerabilities and Patches 

Published On Apr 14, 2026 by Tuukka Tiainen Tuukka Tiainen
5 min

March marked a clear increase in vulnerability and remediation activity compared to February. We identified 249 unique vulnerabilities affecting 81 applications, and remediation work resulted in 139 unique updates during the month. Both the volume of findings and patching activity rose notably, making March one of the more active periods so far this year. 

Last month stands out due to the volume of vulnerabilities remediated, but this is largely explained by how vendors released patches during that time. Several major products shipped bulk security updates, where a single version fixed dozens of vulnerabilities at once. Browsers and runtimes in particular accounted for much of the increase, as they routinely bundle large numbers of memory‑safety fixes into scheduled releases. 

Notable vulnerabilities in March 2026 third-party patches 

CVE-2026-5281CVE20263910, and CVE20263909 all stand out this month due to the availability of public exploits. While not all environments will be directly exposed, the existence of working exploits significantly increases the risk of real‑world abuse and shortens the time window for safe remediation.  

CVE-2026-5281 is a high‑severity vulnerability in Google Chrome’s Dawn component, which implements WebGPU functionality. The flaw is a use‑after‑free condition that can be triggered after an attacker has already compromised the browser’s renderer process. By abusing this memory‑safety issue through a specially crafted HTML page, an attacker can achieve arbitrary code execution within the context of the browser. Google confirmed that this vulnerability was actively exploited in the wild prior to the availability of a patch. It has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. The assigned CVSS 3 score of 8.8 (High) reflects both the technical impact and the realistic exploitation potential when combined with other browser flaws. More information is available in the Chrome Releases security advisory and CISA’s KEV entry

CVE20263910 affects Google Chrome’s V8 JavaScript engine and is caused by an inappropriate implementation that can be abused through a specially crafted HTML page. The flaw allows a remote attacker to execute arbitrary code inside the browser’s sandbox, without requiring authentication or direct user interaction beyond visiting a malicious webpage. This isn’t the first time V8 has had a zero-day vulnerability. Google has confirmed that CVE‑2026‑3910 has been actively exploited in the wild, and the vulnerability is listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog. As with other V8 vulnerabilities, Chromium‑based browsers that lag behind Chrome’s patch cadence may also be affected. Organizations should prioritize updating Chrome and other Chromium‑based browsers to patched versions, particularly in environments where users routinely browse untrusted or external web content. Additional technical details and remediation guidance are available through Chrome Releases and CISA KEV

CVE20263909 is a high‑severity vulnerability in Google Skia, an open‑source 2D graphics library used by Google Chrome and a broad range of other platforms, including ChromeOS, Android, Flutter, and additional Chromium‑based products. The vulnerability is an out‑of‑bounds write, triggered via a crafted HTML page, which allows a remote attacker to perform out‑of‑bounds memory access. The vulnerability was actively exploited in the wild prior to patch availability, and it has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. The issue affects Google Chrome versions prior to 146.0.7680.75, but due to Skia’s widespread use, the potential impact extends beyond Chrome itself. Products embedding Skia or relying on Chromium components may also be affected depending on how quickly upstream patches were integrated. More information can be found on Chrome Releases security advisory and CISA KEV

March also saw several vulnerabilities assigned the maximum CVSS score of 10, indicating critical severity and the potential for full compromise of affected systems if exploited. CVE-2026-4689, CVE-2026-4725 and CVE20264692 impact Mozilla Firefox and Thunderbird, where flaws in boundary handling can lead to sandbox escape scenarios, allowing malicious code to break out of browser isolation. CVE20264688 also affects Firefox through a use‑after‑free condition in the Disability Access APIs, which could enable elevated impact under specific conditions. 

CVE202568121 is a critical vulnerability in the Go programming language’s crypto/tls library. Any Go‑based software that uses the affected TLS functionality may be impacted. This includes Microsoft Azure Kubelogin, which relies on Go’s TLS implementation to authenticate and integrate Azure identity with Kubernetes clusters. 
 

Browser security updates in March 2026 

Major browsers, including Google Chrome, Microsoft Edge, Brave, Mozilla Firefox (including ESR versions), Opera One, Vivaldi, and others received numerous security updates addressing various vulnerabilities.  

Browser Vulnerabilities Updates 
Google Chrome 87 
Microsoft Edge 41 
Brave Browser 74 
Mozilla Firefox 49 
Mozilla Firefox 115 17 
Mozilla Firefox 140 38 
Pale Moon 
Vivaldi 
Waterfox 38 

Microsoft product updates included in March 2026 third-party patches 

Microsoft issued security updates for several other products: 

  • Microsoft .NET Runtime 10.0 
  • Microsoft .NET Runtime 8.0 
  • Microsoft .NET Runtime 9.0 
  • Microsoft .NET SDK 10.0 
  • Microsoft .NET SDK 8.0 
  • Microsoft .NET SDK 9.0 
  • Microsoft 365 Apps 
  • Microsoft ASP.NET Core Runtime 10.0 
  • Microsoft ASP.NET Core Runtime 8.0 
  • Microsoft ASP.NET Core Runtime 9.0 
  • Microsoft ASP.NET Core Runtime Hosting Bundle 10.0 
  • Microsoft ASP.NET Core Runtime Hosting Bundle 8.0 
  • Microsoft ASP.NET Core Runtime Hosting Bundle 9.0 
  • Microsoft Azure CLI 
  • Microsoft Edge Beta 
  • Microsoft Edge for Business 
  • Microsoft Project 
  • Microsoft Visio 
  • Microsoft Visual Studio 2022 Community 
  • Microsoft Visual Studio 2022 Enterprise 
  • Microsoft Visual Studio 2022 Professional 
  • Microsoft Visual Studio Code 
  • Microsoft Visual Studio Team Explorer 2022 
  • Microsoft Windows Desktop Runtime 10.0 
  • Microsoft Windows Desktop Runtime 8.0 
  • Microsoft Windows Desktop Runtime 9.0 

Detailed list of March 2026 third-party patches 

For a complete list of applications, versions, and the number of remediated vulnerabilities, see the table below generated using Application Workspace data. 

ProductName Version Name Vulnerabilities remediated 
Accessibility Insights for Windows 1.1.2924.1 
Adobe Acrobat DC 25.001.21288 
Adobe Acrobat Reader DC 25.001.21288 
Adobe Acrobat Reader DC – Multilingual (MUI) 25.001.21288 
Application Workspace Agent 4 4.4.4174.8323 
Autodesk Revit 2023 Temp 03/06/2026 07:46:37 2023.1.9 
Brave Browser 1.88.136 
Brave Browser 1.88.134 26 
Brave Browser 1.87.192 10 
Brave Browser 1.88.127 29 
Brave Browser 1.88.132 
Burp Suite Community Edition 2026.3.1 26 
Burp Suite Community Edition 2026.2.3 11 
Burp Suite Professional Edition 2026.3.1 26 
Burp Suite Professional Edition 2026.2.3 11 
ClamAV 1.5.2 
Cryptomator 1.19.2 
Cryptomator 1.19.2.6322 
Cryptomator 1.19.1 
Cryptomator 1.19.1.6316 
Datadog Agent 7.76.3 
Docker Desktop 4.67.0 
Docker Desktop 4.67.0.222858 
Erlang OTP 28.4.1.0 
Foxit PDF Editor 13 13.2.3.24041 
Foxit PDF Editor Pro 13 13.2.3.24041 
Git 2.53.0.2 
Google Chrome 146.0.7680.178 21 
Google Chrome 146.0.7680.177 21 
Google Chrome 146.0.7680.164 
Google Chrome 146.0.7680.165 
Google Chrome 145.0.7632.159 10 
Google Chrome 146.0.7680.75 
Google Chrome 146.0.7680.76 
Google Chrome 146.0.7680.153 26 
Google Chrome 146.0.7680.154 26 
Google Chrome 146.0.7680.80 
Google Chrome 146.0.7680.71 29 
Google Chrome 146.0.7680.72 29 
Google Chrome for Business 146.0.7680.178 21 
Google Chrome for Business 146.0.7680.154 26 
Google Chrome for Business 146.0.7680.165 
Google Chrome for Business 146.0.7680.76 
Google Chrome for Business 146.0.7680.80 
Google Chrome for Business 146.0.7680.72 29 
Google Chrome for Education 146.0.7680.178 21 
Google Chrome for Education 146.0.7680.154 26 
Google Chrome for Education 146.0.7680.165 
Google Chrome for Education 146.0.7680.76 
Google Chrome for Education 146.0.7680.80 
Google Chrome for Education 146.0.7680.72 29 
Google Go Programming Language 1.26.1 
Google Go Programming Language 1.25.8 
Grafana k6 1.7.1 
IBM Semeru Runtime Open Edition JDK 8 (LTS) 8.0.482.8 
IBM Semeru Runtime Open Edition JRE 8 (LTS) 8.0.482.8 
Microsoft .NET Runtime 10.0 10.0.4 
Microsoft .NET Runtime 8.0 8.0.25 
Microsoft .NET Runtime 8.0 8.0.25.35812 
Microsoft .NET Runtime 9.0 9.0.14 
Microsoft .NET SDK 10.0 10.0.200 
Microsoft .NET SDK 8.0 8.0.419 
Microsoft .NET SDK 8.0 8.4.1926.11301 
Microsoft .NET SDK 9.0 9.0.312 
Microsoft 365 Apps 2602 (Build 16.0.19725.20170) 
Microsoft 365 Apps 2508 (Build 16.0.19127.20570) 
Microsoft 365 Apps 2602 (Build 16.0.19725.20172) 
Microsoft ASP.NET Core Runtime 10.0 10.0.4 
Microsoft ASP.NET Core Runtime 8.0 8.0.25 
Microsoft ASP.NET Core Runtime 8.0 8.0.25.26112 
Microsoft ASP.NET Core Runtime 9.0 9.0.14 
Microsoft ASP.NET Core Runtime Hosting Bundle 10.0 10.0.4 
Microsoft ASP.NET Core Runtime Hosting Bundle 8.0 8.0.25.26112 
Microsoft ASP.NET Core Runtime Hosting Bundle 9.0 9.0.14 
Microsoft Azure Kubelogin 0.2.16 
Microsoft Edge Beta 146.0.3856.59 31 
Microsoft Edge Beta 146.0.3856.62 
Microsoft Edge for Business 146.0.3856.84 
Microsoft Edge for Business 146.0.3856.72 23 
Microsoft Edge for Business 146.0.3856.72 24 
Microsoft Edge for Business 146.0.3856.72 22 
Microsoft Edge for Business 145.0.3800.97 
Microsoft Edge for Business 146.0.3856.59 34 
Microsoft Edge for Business 146.0.3856.62 
Microsoft Project 2602 (Build 16.0.19725.20172) 
Microsoft Visio 2602 (Build 16.0.19725.20172) 
Microsoft Visual Studio 2019 Enterprise 16.11.37027.11 
Microsoft Visual Studio 2019 Professional 16.11.37027.11 
Microsoft Visual Studio 2022 Enterprise 17.14.37027.9 
Microsoft Visual Studio 2022 Enterprise 17.12.37027.10 
Microsoft Visual Studio 2022 Professional 17.14.37027.9 
Microsoft Visual Studio 2022 Professional 17.12.37027.10 
Microsoft Visual Studio Tools for Applications 17.1.37110.0 
Microsoft Windows Desktop Runtime 10.0 10.0.4 
Microsoft Windows Desktop Runtime 8.0 8.0.25.35812 
Microsoft Windows Desktop Runtime 9.0 9.0.14 
MongoDB Community Edition 8.2 8.2.6 
MongoDB Enterprise Edition 8.2 8.2.6 
Mozilla Firefox 149.0 46 
Mozilla Firefox 149.0 41 
Mozilla Firefox 148.0.2 
Mozilla Firefox ESR 115 115.34.0 17 
Mozilla Firefox ESR 140 140.9.0 38 
Mozilla Firefox ESR 140 140.9.0 12 
Mozilla Thunderbird 149.0 48 
Mozilla Thunderbird 149.0 44 
Mozilla Thunderbird ESR 140 140.9.0 40 
Mozilla Thunderbird ESR 140 140.9.0 34 
nginx 1.29.7 
nginx 1.28.3 
nginx 1.29.5 
nginx 1.28.2 
Node.js 20 LTS 20.20.2 
Node.js 22 LTS 22.22.2 
Node.js 24 24.14.1 
Node.js 25 25.8.2 
NoMachine 9.4.14 
NoMachine Enterprise Client 9.4.14 
NoMachine Enterprise Desktop 9.4.14 
NoMachine Fonts 100dpi 9.4.14 
NoMachine Fonts 75dpi 9.4.14 
NoMachine Fonts Misc 9.4.14 
NoMachine Fonts Others 9.4.14 
Notepad++ 8.9.3 
Opera One 129.0.5823.15 
Pale Moon 34.1.0 16 
Pale Moon 34.1.0 
PaperCut MF 25.0.10.75465 
PaperCut NG 25.0.10.75466 
Sandboxie Classic 5.72.3 
Sandboxie Plus 1.17.3 
Splunk Enterprise 10.2.1 
Splunk Enterprise 10.0.4 
Splunk Enterprise 9.3 9.3.10 
Splunk Enterprise 9.4 9.4.9 
Vivaldi 7.8.3925.79 
Vivaldi 7.8.3925.81 
Waterfox 6.6.10 38 

Application management at the speed of your operations 

Vulnerabilities move fast, especially in a distributed workforce. Discover how Recast’s application management product, Application Workspace, helps IT teams keep applications patched, compliant, and correctly configured, wherever work happens. 

Share