Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Microsoft Releases Windows 11 OOB Hotpatch to Fix Three
Microsoft Releases Windows 11 OOB Hotpatch to Fix Three
NEWS

Microsoft Releases Windows 11 OOB Hotpatch to Fix Three

Microsoft has pushed an out-of-band hotpatch (KB5084597) to Windows 11 Enterprise devices to address three integer-overflow RCE flaws in RRAS, one rated...

Dylan H.

News Desk

March 14, 2026
6 min read

Microsoft Pushes Emergency Windows 11 Hotpatch for Three RRAS RCE Flaws

Microsoft has released an out-of-band (OOB) update, KB5084597, to address three critical-to-high severity Remote Code Execution (RCE) vulnerabilities in the Routing and Remote Access Service (RRAS) component. The patch was issued on March 13, 2026 — three days after the standard March 10 Patch Tuesday — and is delivered as a hotpatch, meaning enrolled Windows 11 Enterprise devices receive the fix in memory without requiring a system reboot.

All three CVEs share the same root cause: integer overflow or wraparound conditions in the RRAS packet-processing and management-protocol engines.


The Three Vulnerabilities

CVECVSSSeverityAttack Vector
CVE-2026-251728.8HighUnauthenticated remote attacker
CVE-2026-251739.8CriticalAuthenticated domain user (malicious-server pattern)
CVE-2026-261118.8HighAuthorized attacker on the network

CVE-2026-25172 — Unauthenticated RRAS Integer Overflow (CVSS 8.8)

An unauthenticated attacker can send specially crafted packets to a system with RRAS enabled. The malformed input triggers an integer overflow in the packet-reassembly logic, leading to heap buffer under-allocation and subsequent memory corruption. No credentials or user interaction are required — only network reachability to the RRAS listener.

CVE-2026-25173 — Critical Domain User RCE via RRAS Snap-in (CVSS 9.8)

The most severe of the three, CVE-2026-25173 targets the RRAS MMC Snap-in used by administrators to manage remote RRAS servers. When an administrator connects the Snap-in to an attacker-controlled server (via phishing, MitM, or network-level manipulation), the malicious server's crafted response triggers an integer overflow on the administrator's client machine — resulting in RCE on the administrator's workstation, not the server.

This malicious-server attack pattern means domain-joined Windows 11 Enterprise machines running the RRAS management tools are at risk even if RRAS itself is not enabled on those clients.

CVE-2026-26111 — Integer Overflow RCE with Network Access (CVSS 8.8)

A third integer overflow in the RRAS engine is exploitable by an authorized attacker with network access. The exploitation path follows the same heap-corruption mechanism as CVE-2026-25172, but requires the attacker to be authenticated on the network segment.


What Is RRAS?

Routing and Remote Access Service (RRAS) is a Windows Server role that provides:

  • VPN gateway functionality — PPTP, L2TP, SSTP, IKEv2 inbound VPN
  • Software router — IP routing in LAN/WAN environments
  • NAT — public/private IP sharing
  • Site-to-site VPN — geographically separated network linking
  • DHCP and DNS proxy — basic name/address resolution for connected clients

The RRAS Snap-in (MMC management console) also ships on domain-joined Windows client machines — and it is this client-side management component that is the primary attack surface for CVE-2026-25173.


Why the OOB Hotpatch?

Microsoft reserved the standard Patch Tuesday delivery for Windows Server systems (fixes delivered via KB5053651/KB5053636). Exploitation attempts targeting RRAS were detected against Windows Server infrastructure beginning late January 2026, prompting accelerated delivery for Windows 11 Enterprise endpoints.

The hotpatch delivery mechanism patches running processes in memory without requiring a restart, making it suitable for environments with strict uptime requirements. The fix persists across reboots and is cumulative with the March 10, 2026 baseline.


Affected Versions

PlatformBuildPatch Delivery
Windows 11 25H2 Enterprise/Education26200.7982KB5084597 (hotpatch)
Windows 11 24H2 Enterprise/Education26100.7982KB5084597 (hotpatch)
Windows 11 Enterprise LTSC 202426100.7982KB5084597 (hotpatch)
Windows Server 2019/2022/2025VariousStandard cumulative update

The hotpatch is automatically delivered to devices enrolled in Windows Autopatch with hotpatch updates enabled — no manual action and no restart required.


Remediation

Immediate Actions

  1. Apply KB5084597 — automatically pushed to Autopatch-enrolled devices. Manually install via Windows Update for other Windows 11 Enterprise systems.
  2. Patch Windows Server via the standard March 2026 cumulative update (KB5053651 / KB5053636 depending on OS version).
  3. Verify RRAS exposure — identify which servers have RRAS enabled and ensure they are not directly internet-facing.
  4. Audit RRAS Snap-in usage — determine which administrator workstations have the RRAS MMC Snap-in installed, and restrict access to management networks only.

If Immediate Patching Is Delayed

# Disable RRAS if it is not actively in use
Stop-Service RemoteAccess -Force
Set-Service RemoteAccess -StartupType Disabled
 
# Verify RRAS is stopped
Get-Service RemoteAccess | Select-Object Name, Status, StartType
# Block RRAS management port from non-management networks (adjust subnet as needed)
New-NetFirewallRule -DisplayName "Temp: Block RRAS Mgmt External" `
  -Direction Inbound `
  -LocalPort 1723,1701,443 `
  -Protocol TCP `
  -Action Block

Detection Indicators

Monitor for the following post-exploitation signals:

IndicatorSignificance
RRAS service spawning unexpected child processesDirect exploitation attempt
New local admin accounts appearing on RRAS serversPost-exploitation persistence
Unusual outbound connections from RRAS hostsC2 or exfiltration
RRAS Snap-in connecting to non-standard management server IPsCVE-2026-25173 exploitation
Heap corruption crash dumps in RRAS process spaceExploitation attempt (possibly failed)

Broader Context

These three vulnerabilities continue a trend of adversaries targeting VPN and remote access infrastructure as high-value initial access vectors. RRAS servers, deployed as enterprise VPN gateways and edge routers, represent a single point of failure: compromise grants an attacker a foothold inside the network perimeter at the network layer, ahead of application-level controls.

The unauthenticated path in CVE-2026-25172 is of particular concern for organizations that expose RRAS endpoints to the internet — a common configuration for site-to-site VPN termination.


Sources

  • BleepingComputer — Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw
  • Neowin — KB5084597: Microsoft outs Windows 11 25H2, 24H2 emergency update for critical network flaw
  • Microsoft Support — March 13, 2026 Hotpatch KB5084597 Out-of-Band
  • MSRC — CVE-2026-25173

Related Reading

  • Veeam Patches Five Critical RCE Vulnerabilities Exposing
  • Microsoft January 2026 Patch Tuesday: 114 Flaws Fixed, One
  • Microsoft Patch Tuesday February 2026: 6 Actively Exploited
#Microsoft#Windows#RRAS#RCE#CVE-2026-25172#CVE-2026-25173#CVE-2026-26111#Hotpatch#Security Updates#Patch Tuesday

Related Articles

Windows 11 February Update Breaks C:\ Drive Access on Samsung PCs

Microsoft is investigating a new bug affecting Samsung laptops after the February 2026 security update — some users are unable to access their C: drive...

5 min read

Veeam Patches Five Critical RCE Vulnerabilities Exposing

Veeam Software has released a critical security update for Backup & Replication, patching five remote code execution vulnerabilities with CVSS scores...

6 min read

Critical Unpatched GNU Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE

Researchers have disclosed a critical unauthenticated remote code execution vulnerability in the GNU InetUtils telnet daemon (telnetd). CVE-2026-32746...

7 min read
Back to all News