[CIAD-2026-0014] Multiple Vulnerabilities in Microsoft Products

By Published On: March 25, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Microsoft Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: High


Software Affected


Azure DevOps: msazure

Azure Data Factory

Microsoft 365 Copilot

Microsoft Bing

Microsoft Copilot

Microsoft 365 Copilot’s Business Chat

Microsoft Purview

Azure Cloud Shell

Microsoft Bing Images

Overview


Multiple vulnerabilities have been reported in Microsoft Products, which could allow an attacker to execute remote code, gain elevated privileges, perform Server-side request forgery (SSRF) attacks and potentially view sensitive information on the targeted system.


Target Audience:

Individuals and IT administrators, security teams responsible for maintaining and updating Microsoft products


Risk Assessment:

Risk of Remote code execution, elevation of privileges, system instability, or sensitive information disclosure


Impact Assessment:

Potentials compromise of system, exfiltration of data, ransomware attacks or system crashes.


Description


Multiple vulnerabilities have been reported in Microsoft Products, which could allow an attacker to execute remote code, gain elevated privileges, perform Server-side request forgery (SSRF) attacks and potentially view sensitive information on the targeted system.


For complete list of affected products, CVEs, workarounds and solutions, refer to the Microsoft security updates.

https://msrc.microsoft.com/update-guide/




Solution


Apply appropriate security updates as mentioned in:  

https://msrc.microsoft.com/update-guide/


References


Microsoft

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23658

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23659

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24299

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26120

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26136

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26137

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26138

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26139

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32169

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32191

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32194


CVE Name

CVE-2026-23658

CVE-2026-23659

CVE-2026-24299

CVE-2026-26120

CVE-2026-26136

CVE-2026-26137

CVE-2026-26138

CVE-2026-26139

CVE-2026-32169

CVE-2026-32191

CVE-2026-32194




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnD+B0ACgkQ3jCgcSdc

ys9E6A//d6KAvWGhbswkle1wHvbp1CEh/V4ofaCMdszuV9QvgOMbtRG5L6LpX8Zz

3vHAk7IxwvasxAhSs7emudCJxwUqj4kvcdMVb7AhQ+HXOo+Es3f7cH/WK4smDRbv

NVPhjHHK6MNlZdT0fHjtrswnagqt0jE2u/YcpWrWjfgXoZMkj//ijvsmDGDze5mJ

uvji7FJlC0ryDMxqrwMmB6yP0T8u1+nxZWWvYw1y+xDy6t7Tv+WGPFV0lw6KO3QL

P++gp0rul/NdGh3lmWyPF26hIcMyOEPK7URDpZWa+N/aj2x39dnMzWbMUGlVvIdq

9172TdwDUMXgK0a2jE1b/yOYBYrSCatLxMCWMb08ICKEJQX5Ed9k8i/XwvJxw0v3

qsTZHc9NeS6E7AWC0ktjqSKRZwS7Z7MBbrX90dKfkm+58qKIXifKxTowgd6il7Cw

8JObNYCUgg9uegwQLB1WI7KG2IOCwFgLko15nZaVfvfkUdo4qt2Bk9Zh4cKmIiGg

N7/7ZWLopENwGyk0hulWXrs3NX06B/WKpFWEUNZiikHhBHYuAaaeMGxit5x8VdCc

ENgQ56lNV5ma5ybaDXrDo0+FUl9FpsJwLfRv2EyVyEahHTe68B79dk/6OKP/PozX

i6Cw/LgjyCOOSZhaUGT0Xc+ULqNDbCFWZje40Aiu7di1yGNGkfQ=

=HT8I

—–END PGP SIGNATURE—–

Share this article