The March 2026 security updates have been released to fix a number of holes in both enterprise and AI software systems. The most worrying problem in this patch cycle is with NVIDIA Apex, a well-known PyTorch add-on for mixed-precision and distributed AI training. Attackers who take advantage of this could take over training workloads, steal proprietary AI models, or get deeper into business networks.
NVIDIA fixed a number of serious security holes in its main AI tools, such as Triton Inference Server, Megatron LM, NeMo Framework, and Model Optimizer. The NVIDIA Product Security Incident Response Team (PSIRT) now posts these bulletins on GitHub along with regular web alerts. This is the result of an effort that started late last year. The data is available in both Markdown and CSAF formats, which makes it easier for automated systems to quickly process CVE information and respond more quickly.
The table below shows the products that were affected, how bad the problems were, and the CVE IDs from the March 24, 2026, update. This makes it easier for security teams to deal with them than before. Companies that use AI frameworks, network components, and MCU hardware that are affected need to make these patches a top priority to protect their systems from new remote access and DoS threats.
Read the full NVIDIA Security Bulletins for March 2026 by clicking here. Then, without delay, install the software package updates that are suggested. If you need private help, you can call the Samaritans at 08457 90 90 90, go to a local Samaritans branch, or click here for more information.












