The Weekly Cybersecurity Brief
TOP STORY: March Patch Tuesday Lands with Public Zero-Days and Fresh RCE Risk
Microsoft's March 10 Patch Tuesday release fixed roughly 80 vulnerabilities, including two publicly disclosed zero-days and several high-impact flaws affecting Office, SharePoint, RRAS, and Excel. The practical takeaway is straightforward: if Windows and Office patching slipped this week, your environment is exposed.
The Threat:
Broad enterprise exposure across common Microsoft components means attackers do not need exotic footholds. User-facing Office paths, SharePoint exposure, and remote access services remain common attack surfaces.
The Status:
Patches were released on March 10 and organizations should already be verifying deployment success across endpoints and servers.
Mitigation:
Prioritize March Microsoft updates on internet-facing systems, SharePoint infrastructure, remote access services, and Office-heavy endpoints. Validate that updates installed successfully and monitor authentication and application logs for anomalies.
CRITICAL PATCHES (CVE WATCH)
Veeam Backup & Replication (https://cvedatabase.com/cve/CVE-2026-21666) - CVSS 9.9
Issue: Authenticated domain users can achieve remote code execution on the backup server in affected Veeam Backup & Replication 12 builds.
Action: Upgrade Veeam Backup & Replication to version 12.3.2.4465 or later and restrict low-privileged domain access to backup infrastructure.
Veeam Backup & Replication (https://cvedatabase.com/cve/CVE-2026-21667) - CVSS 9.9
Issue: A second vulnerability enables authenticated domain users to execute arbitrary code on backup servers.
Action: Patch immediately and review domain permissions to ensure backup systems are not accessible to unnecessary accounts.
Veeam Backup & Replication (https://cvedatabase.com/cve/CVE-2026-21708) - CVSS 9.9
Issue: Backup Viewer role abuse may allow remote code execution as the postgres service account.
Action: Apply the latest updates and audit role assignments for Backup Viewer permissions.
n8n Automation Platform (https://cvedatabase.com/cve/CVE-2025-68613) - CVSS 9.9
Issue: Expression injection vulnerability enabling authenticated remote code execution on n8n automation servers.
Action: Patch n8n to the latest version and rotate any credentials or secrets stored within workflows.
Microsoft SharePoint (https://cvedatabase.com/cve/CVE-2026-26105) - CVSS 9.3
Issue: Cross-site scripting vulnerability allowing spoofing attacks in Microsoft SharePoint environments.
Action: Apply March Microsoft updates and review access policies for externally accessible SharePoint portals.
BREACH BRIEFING
Loblaw:
Canada's largest grocery retailer disclosed a security incident involving unauthorized access to a non-critical IT system. Exposed data reportedly included limited customer contact information such as names and email addresses, while payment card data and financial systems were not impacted.
TRENDS & ANALYSIS
1. Backup and Automation Platforms Are Becoming Prime Attack Targets
Recent critical vulnerabilities highlight a shift toward infrastructure platforms like backup systems and workflow automation tools. Because these systems often store credentials and connect to multiple internal services, exploitation can dramatically increase the blast radius of a compromise.
ONE ACTION ITEM
Patch and isolate backup and automation platforms
Why:
This week's highest-risk vulnerabilities affected backup infrastructure and automation servers—systems that often contain credentials, configuration secrets, and privileged access across environments.
Action:
• Patch Veeam Backup & Replication and n8n to the latest versions
• Rotate credentials stored in backup and automation platforms
Stay safe and patch often
https://www.cvedatabase.com
