⚡ Key Takeaways

March 2026 produced a concentrated zero-day harvest: two Chrome vulnerabilities actively exploited in the wild (CVE-2026-3909 and CVE-2026-3910), a Qualcomm Android flaw under targeted exploitation (CVE-2026-21385) affecting 230+ chipsets, and a publicly disclosed SQL Server privilege escalation (CVE-2026-21262) with an 8.8 CVSS score — all patched, all demanding immediate action.

Bottom Line: Algerian IT teams should verify Chrome version 146.0.7680.80+ across all managed browsers, enforce the 2026-03-05 Android security patch level on BYOD devices, and apply SQL Server KB updates before threat actors weaponize CVE-2026-21262. Organizations using Qualcomm-based Android devices (the vast majority in Algeria) should prioritize CVE-2026-21385 patching, as targeted exploitation consistent with spyware campaigns is already confirmed.

Read Full Analysis ↓

Advertisement

🧭 Decision Radar (Algeria Lens)

Relevance for Algeria
High

Chrome and Android are dominant platforms in Algeria (Android holds 80%+ mobile market share), and many Algerian enterprises run SQL Server. All five vulnerabilities directly affect the Algerian technology stack.
Infrastructure Ready?
Partial

Large Algerian enterprises and government agencies have patch management processes, but SMEs and BYOD environments often lack automated update enforcement for Chrome, Android, and database servers.
Skills Available?
Partial

Algerian IT teams can apply patches, but vulnerability triage and exploit chain analysis require specialized skills that are developing under the 2025-2029 cybersecurity strategy.
Action Timeline
Immediate

All five CVEs are patched and several have CISA remediation deadlines that have already passed. Unpatched systems are actively exposed.
Key Stakeholders
IT administrators, CISOs, SOC analysts Teams managing browser deployments, mobile device policies, and SQL Server instances who must coordinate three distinct patch cycles simultaneously.
Decision Type
Tactical

This article provides specific CVE-by-CVE patch guidance for security teams managing enterprise infrastructure.

Quick Take: Algerian IT teams should verify Chrome version 146.0.7680.80+ across all managed browsers, enforce the 2026-03-05 Android security patch level on BYOD devices, and apply SQL Server KB updates before threat actors weaponize CVE-2026-21262. Organizations using Qualcomm-based Android devices (the vast majority in Algeria) should prioritize CVE-2026-21385 patching, as targeted exploitation consistent with spyware campaigns is already confirmed.

Three Exploited Zero-Days Plus Two Public Disclosures, One Month

March 2026 was not a quiet month for vulnerability management teams. Across Google Chrome, Android, and Microsoft SQL Server, three actively exploited zero-days and two publicly disclosed vulnerabilities required emergency patching cycles, with CISA adding multiple entries to the Known Exploited Vulnerabilities (KEV) catalog.

Each vulnerability targets a different layer of the enterprise stack — browser, mobile device, database — meaning no single patch cycle covers all exposure. Organizations running Chrome on desktops, Android devices in the field, and SQL Server backends needed to coordinate three distinct remediation workflows in a single month.

Here is what was exploited, how, and what defenders need to do.

Chrome: Two Zero-Days in V8 and Skia

Google released an emergency Chrome update on March 13, 2026, patching two vulnerabilities confirmed as exploited in the wild. Both received a Qualys Vulnerability Score (QVS) of 95 out of 100.

CVE-2026-3910 — V8 JavaScript Engine

Type: Inappropriate implementation in V8 Impact: Arbitrary code execution within the browser sandbox Attack vector: Crafted HTML page

CVE-2026-3910 targets Chrome’s V8 JavaScript and WebAssembly engine — the component responsible for executing all JavaScript on every web page. A specifically crafted HTML page can trigger the vulnerability, allowing a remote attacker to execute arbitrary code inside the browser sandbox.

V8 vulnerabilities are prized by exploit developers because JavaScript execution is universal across all browsing activity. The attacker needs only to convince the target to visit a malicious page or inject the payload into a compromised legitimate site.

Google explicitly confirmed that “exploits for CVE-2026-3910 exist in the wild” but withheld details about the exploitation campaigns and the threat actors behind them — standard practice to prevent additional weaponization.

CVE-2026-3909 — Skia 2D Graphics Library

Type: Out-of-bounds write in Skia Impact: Memory corruption, potential remote code execution Attack vector: Crafted HTML page

The Skia 2D graphics library handles all rendering in Chrome — text, images, SVG, canvas elements. CVE-2026-3909 is an out-of-bounds write vulnerability that allows a remote attacker to write data past the intended memory boundary via a crafted HTML page.

Out-of-bounds writes in graphics libraries are particularly dangerous because rendering is constant and automatic. Unlike JavaScript exploits that require specific code execution, Skia vulnerabilities can be triggered simply by rendering a malicious image or graphic element embedded in any web page.

Patches and Deadlines

Google initially released version 146.0.7680.75/76 on March 12, followed by 146.0.7680.80 on March 14 which included the complete fix for both CVEs. CISA added both CVEs to the Known Exploited Vulnerabilities catalog on March 13, 2026, setting a March 27, 2026 remediation deadline for Federal Civilian Executive Branch (FCEB) agencies.

Enterprise Chrome deployments should verify all managed browsers are running version 146.0.7680.80 or later. Organizations using Chromium-based browsers (Edge, Brave, Opera) should verify their downstream patches, as both V8 and Skia are shared components.

Android: Qualcomm Graphics Zero-Day Under Targeted Exploitation

CVE-2026-21385 — Qualcomm Graphics Subcomponent

Type: Integer overflow/wraparound in Qualcomm GPU driver Impact: Memory corruption, local privilege escalation Attack vector: Malicious app or local code delivering crafted data to graphics driver Scale: 230+ Qualcomm chipsets affected

Google’s March 2026 Android Security Bulletin patched 129 vulnerabilities across two security patch levels (2026-03-01 and 2026-03-05). Among them, CVE-2026-21385 stands out as the only vulnerability confirmed under active exploitation.

The flaw resides in an open-source Qualcomm graphics/display component used by over 230 different chipset models. Qualcomm described it as an integer overflow or wraparound that can be exploited by a local attacker to trigger memory corruption in a controlled way.

The “local” attack vector means the attacker needs code running on the device — typically through a malicious app installed from a third-party source, or as part of a multi-stage exploit chain where a browser or messaging vulnerability delivers the initial payload, and CVE-2026-21385 provides the privilege escalation needed to escape the app sandbox.

Google’s security bulletin notes “limited, targeted exploitation,” which typically indicates a small number of high-value targets — journalists, dissidents, government officials — rather than mass consumer attacks. This pattern is consistent with commercial spyware vendors who specialize in Android exploit chains for targeted surveillance.

Timeline

  • December 18, 2025 — Google’s Android Security team alerts Qualcomm.
  • February 2, 2026 — Qualcomm notifies OEM customers.
  • March 3, 2026 — CISA adds CVE-2026-21385 to the KEV catalog, setting a March 24, 2026 remediation deadline.
  • March 5, 2026 — Patches available in the 2026-03-05 Android security patch level.

Remediation Challenges

Android’s fragmented update ecosystem means patch availability does not equal patch deployment. Google Pixel devices received the March update promptly. Samsung, OnePlus, and other major OEMs typically follow within two to four weeks. Budget devices and older models from smaller manufacturers may never receive the patch.

Organizations with BYOD policies should verify that enrolled devices are running at least the 2026-03-05 security patch level. Devices that cannot be updated should be restricted from accessing sensitive corporate resources.

Advertisement

SQL Server: Privilege Escalation Goes Public

CVE-2026-21262 — SQL Server Elevation of Privilege

Type: Improper access control Impact: Full database instance compromise from low-privilege authenticated access CVSS: 8.8 (High) Exploitation status: Publicly disclosed, not confirmed as actively exploited at release

Microsoft’s March 2026 Patch Tuesday addressed 79 to 84 vulnerabilities (counts vary by methodology), including two publicly disclosed zero-days. CVE-2026-21262 is the more consequential of the pair.

The vulnerability allows an authenticated, low-privileged SQL Server user to escalate their privileges over the network to the highest built-in role — sysadmin — on the database instance. Successful exploitation grants the attacker the ability to read, modify, or delete any data in user and system databases; create new logins; alter existing permissions; and deploy malicious objects such as triggers or stored procedures to maintain persistence.

The attack requires network-level connectivity to an affected SQL Server instance and a valid SQL login with limited privileges. It cannot be exploited anonymously. However, the combination of public disclosure and an 8.8 CVSS score makes this an attractive target for post-compromise lateral movement in environments where SQL Server credentials are already available through prior access.

Affected Versions and Patches

Microsoft released security updates across the full SQL Server support matrix:

Version Update Track KB Article
SQL Server 2016 SP3 GDR KB5077474
SQL Server 2017 CU31 KB5077471
SQL Server 2019 CU32 KB5077469
SQL Server 2022 CU23 / GDR KB5077464 / KB5077465
SQL Server 2025 CU2 / GDR KB5077466 / KB5077468

Updates are available for both Windows and Linux deployments. Organizations running SQL Server in production should prioritize this patch — the public disclosure increases the likelihood of weaponization even without confirmed in-the-wild exploitation at release.

The Broader March 2026 Patch Landscape

Beyond the headline zero-days, the March Patch Tuesday cycle included 46 privilege escalation vulnerabilities, 18 remote code execution flaws, 10 information disclosure issues, four spoofing bugs, four denial-of-service vulnerabilities, and two security feature bypass flaws.

Six vulnerabilities across the full March cycle were flagged as “more likely to be exploited,” meaning defenders should treat them with urgency even in the absence of confirmed exploitation.

Patching Priorities for Security Teams

March 2026’s zero-day harvest demands a layered response:

  1. Chrome: Verify automatic updates NOW. Confirm that all managed browsers are running version 146.0.7680.80 or later. Do not wait for the next scheduled patch cycle.
  1. Android: Enforce minimum patch levels. Set 2026-03-05 as the minimum acceptable Android security patch level for devices accessing corporate resources. Quarantine non-compliant devices.
  1. SQL Server: Patch and audit. Apply the relevant KB update, then audit SQL Server logins for unnecessary low-privilege accounts that could serve as escalation entry points.
  1. Monitor CISA KEV additions. All three platforms had entries added to the KEV catalog in March. Organizations subject to BOD 22-01 have mandatory remediation deadlines.
  1. Review exploit chain exposure. CVE-2026-21385 is most dangerous as part of a chain. If your organization uses Android devices AND has browser-based attack surface, the combination creates compound risk that neither patch alone eliminates.
Follow AlgeriaTech on LinkedIn for professional tech analysis Follow on LinkedIn
Follow @AlgeriaTechNews on X for daily tech insights Follow on X

Advertisement

Frequently Asked Questions

Which March 2026 zero-day is the most critical for enterprises?

CVE-2026-21262 (SQL Server privilege escalation, CVSS 8.8) poses the highest enterprise risk because it allows any authenticated low-privilege user to gain sysadmin access to the entire database instance. Since the exploit details are publicly disclosed, weaponization is likely even though active exploitation was not confirmed at release. Organizations running any SQL Server version from 2016 through 2025 should patch immediately.

Are Qualcomm Android devices in Algeria affected by CVE-2026-21385?

Yes. The vulnerability affects over 230 Qualcomm chipset models, covering the vast majority of Android devices sold in Algeria. Google’s bulletin notes “limited, targeted exploitation” — typically against high-value targets like journalists or officials — but the broad chipset exposure means any unpatched device is technically vulnerable. Devices should be updated to the 2026-03-05 security patch level or restricted from corporate resources.

How should organizations prioritize when five zero-days land in one month?

Start with the platforms that have confirmed active exploitation: Chrome (CVE-2026-3909, CVE-2026-3910) and Android (CVE-2026-21385). These require immediate patching. Then address SQL Server (CVE-2026-21262) based on your exposure — if SQL Server instances are network-accessible with low-privilege accounts, prioritize this next. Use CISA KEV deadlines as a minimum benchmark and coordinate across browser, mobile, and database teams simultaneously.

Sources & Further Reading