All posts

March 2026 Windows Update — Why You Should Install It Now

4 min read

Microsoft's March 2026 Patch Tuesday dropped on March 10th, and it's a big one. Over 80 security vulnerabilities patched, including 2 zero-days that attackers are already actively exploiting. If you haven't installed it yet, do it today.

Here's what was fixed, why it matters, and how to install it.

What's a Zero-Day (and Why Should You Care)?

A zero-day vulnerability is a security flaw that attackers discovered and started exploiting before Microsoft knew about it. The name comes from the fact that developers had "zero days" to fix it before it was used in attacks.

That means right now, before this update is installed, there are known working attacks for these vulnerabilities. Attackers aren't theorising — they're already using them. The longer your PC goes without this update, the more exposed you are.

The Severity Breakdown

81 vulnerabilities patched

Critical
14
14
High
34
34
Medium
26
26
Low
7
7

14 critical vulnerabilities is a lot for a single month. These are the kind of flaws that can give an attacker full control of your PC remotely, with little or no interaction required from you.

The Worst Ones (in Plain English)

2 zero-days — actively exploited

Print spooler remote code execution — A flaw in the Windows print system that lets an attacker run code on your PC. Similar to the infamous PrintNightmare bug from 2021. If your PC has a network printer configured (and most do), you're potentially vulnerable.
Office preview pane attack — An attacker sends you a specially crafted document (Word, Excel, or Rich Text). You don't even have to open it — just viewing it in the preview pane in Outlook or File Explorer is enough to get compromised. This is the scarier of the two because it requires almost no interaction from the victim.

Beyond the zero-days, there are also several privilege escalation bugs — these let an attacker who's already on your system (even with limited access) promote themselves to full administrator. Combined with the vulnerabilities above, this means an attacker could get in through a dodgy email attachment, then take complete control of your machine.

In plain English: someone could take over your PC through an email attachment you don't even open, just preview. That's why this update matters.

How to Install It

  1. Open Settings (press Windows key + I)
  2. Click Windows Update (in Windows 11) or Update & Security (in Windows 10)
  3. Click Check for updates
  4. Let it download and install — this may take 10–30 minutes depending on your PC speed and internet connection
  5. Restart when prompted — the updates don't take effect until you restart. Don't just leave the "restart pending" notification sitting there for days
Pro tip: If you want to restart at a convenient time rather than immediately, go to Windows Update → Advanced options → Active hours. Set your working hours and Windows will only restart outside them.

What If Updates Are Failing?

If Windows Update is stuck, giving you error codes, or failing to install — that's a problem in itself, and one I see regularly. Common causes include low disk space, corrupted update files, or clashing software. Have a look at my post on common PC problems for troubleshooting steps, or how to speed up a slow Windows 11 PC if lack of disk space is the issue.

Don't just ignore failed updates. A PC that can't update is a PC that can't protect itself.

Windows 10 Got Patches Too

Even though Windows 10 reached end of support in October 2025, it received 48 security fixes this month — but only if you've activated the free Extended Security Updates (ESU). If you're still on Windows 10 and haven't set up ESU, you're not getting these patches at all, and every month that gap grows wider.

If you're still on Windows 10, read my Windows 10 end of life guide for your options. The free ESU is available until October 2026, but after that you're completely on your own.

Why This Matters Even If You "Don't Click Dodgy Links"

I hear this all the time: "I'm careful online, I don't need to worry about updates." But the preview pane vulnerability in this month's patch shows exactly why that's wrong — you don't have to click anything. You don't have to open anything. You just have to receive an email and glance at it.

Good security habits are important — having solid antivirus protection matters — but they're not a substitute for keeping your operating system patched. The updates fix the holes that attackers use to get in. Without them, it doesn't matter how careful you are.

For the full technical details, Bleeping Computer's write-up covers every CVE, and Krebs on Security has analysis of the most critical flaws.

Updates stuck or something not right?

If Windows Update is failing, your PC is running slowly after updating, or you're just not sure if you're protected — get in touch and I'll sort it out.