Skip to main content

Thompson InfoSec

When Everything Needs Patching: Lessons from March 2026

83 Microsoft CVEs, Chrome zero-days, Veeam critical flaws, and actively exploited n8n bugs — all in one week. How to think about patch prioritization when everything is urgent.

Jonathan Thompson · March 13, 2026

March 2026 has been relentless for vulnerability management teams. In the span of a single week:

  • Microsoft Patch Tuesday dropped 83 CVEs, including critical SQL Server privilege escalation flaws and two publicly disclosed zero-days
  • Google released emergency Chrome patches for two zero-days under active exploitation — then had to follow up with additional fixes when a third remained unpatched
  • Veeam disclosed three vulnerabilities scored at CVSS 9.9, enabling remote code execution on backup servers
  • CISA ordered federal agencies to patch an actively exploited remote code execution flaw in n8n workflow automation, with approximately 24,700 internet-exposed instances identified

That’s not a bad month. That’s one week.

The Prioritization Problem
#

When everything is critical, nothing is prioritized. And that’s the trap most organizations fall into during disclosure-heavy periods like this.

The instinct is to treat every critical CVE the same way — patch immediately. But in practice, “patch everything immediately” isn’t a strategy. It’s a wish. Real environments have change management processes, testing requirements, and limited maintenance windows. You can’t patch 83 things simultaneously, so you need to make choices.

How to Think About It
#

Start with what’s actively exploited. CISA’s Known Exploited Vulnerabilities (KEV) catalog exists to answer exactly this question. The Chrome zero-days and n8n RCE were both being exploited in the wild. Those go first, regardless of CVSS score. A CVSS 7.5 that’s actively exploited is a bigger immediate risk than a CVSS 9.9 that isn’t.

Assess your exposure. Not every vulnerability affects your environment. The Veeam flaws are critical — but only if you run Veeam. The n8n bug matters — but only if n8n is in your stack. Before prioritizing a patch, answer: “Does this vulnerability exist in our environment, and is it reachable?”

Consider blast radius. The Veeam vulnerabilities target backup infrastructure. Compromised backups don’t just mean data loss — they mean your recovery capability is gone. When a ransomware attack hits, your backups are your last line of defense. Vulnerabilities in backup systems deserve disproportionate urgency.

Don’t forget the browsers. Chrome zero-days are easy to deprioritize because they feel like “user endpoint” issues. But browser exploits are an initial access vector. Every employee with an unpatched browser is a potential entry point. Browser patching should be automated and fast.

The Bigger Lesson
#

Weeks like this one aren’t anomalies anymore. They’re the operating tempo. The volume of disclosed vulnerabilities has been climbing for years, and AI-assisted discovery is accelerating that trend. Organizations that treat vulnerability management as a periodic activity — quarterly scans, annual assessments — are falling further behind every month.

Effective vulnerability management in 2026 requires:

Continuous visibility. You need to know what’s running in your environment at all times — not just during audit season. Asset inventory and vulnerability scanning should be ongoing processes, not events.

Risk-based prioritization. CVSS scores are a starting point, not a strategy. Context matters: is the vulnerability exploited in the wild? Is the affected system internet-facing? Does it handle sensitive data? What’s the blast radius of compromise?

Defined SLAs. How fast do you patch critical vulnerabilities? High? Medium? If you don’t have defined timelines, you don’t have a program — you have ad hoc responses.

Automate what you can. Manual patching doesn’t scale — not at this volume, and not at this pace. OS-level updates, browser patches, and well-tested application updates should be flowing through automated pipelines with minimal human intervention. Tools like WSUS, Intune, SCCM, or third-party patch management platforms exist to take the repetitive work off your team’s plate. Save manual testing and change management for the patches that genuinely need it — infrastructure-critical systems, custom applications, and anything that’s broken a deployment before. The goal isn’t zero human oversight. It’s reserving human judgment for the decisions that actually require it.

Executive visibility. Leadership needs to understand vulnerability management as a risk management function, not an IT task. When your board asks “are we secure?” — your patching metrics should be part of the answer.

The Takeaway
#

March 2026 isn’t unique. It’s what the new normal looks like. The question isn’t whether your organization will face a week where everything needs patching — it’s whether you have the processes, visibility, and prioritization framework to handle it without falling behind.


See how a Risk Assessment can sharpen your priorities →