Out-of-Band Patch for Windows (and why it matters)
Windows 11 (25H2, 24H2, and LTSC 2024) that Microsoft released on March 13–14, 2026 to fix critical RRAS remote code execution vulnerabilities. It installs without requiring a reboot on systems that support hotpatching.
What KB5084597 Addresses
Microsoft issued this update to patch three RRAS (Routing and Remote Access Service) management tool vulnerabilities:
- CVE‑2026‑25172 — RRAS RCE
- CVE‑2026‑25173 — RRAS RCE
- CVE‑2026‑26111 — RRAS RCE
These flaws stem from an integer overflow/wraparound condition. If an administrator’s RRAS management tool connects to a malicious remote server, an attacker could:
- Disrupt the RRAS management tool
- Execute code on the administrator’s device
This makes the vulnerabilities particularly dangerous in enterprise environments where RRAS is used for VPN, NAT, routing, and site‑to‑site connectivity.
Why This Update Is Out‑of‑Band
Microsoft released KB5084597 outside the normal Patch Tuesday cycle because the vulnerabilities are considered high‑risk. The hotpatch mechanism allows Microsoft to:
- Deliver the fix immediately
- Avoid requiring a system restart
- Minimize downtime for enterprise systems
Hotpatching is available only on eligible Windows 11 24H2/25H2 and LTSC 2024 systems that meet Microsoft’s prerequisites.
Affected OS Builds After Installation
KB5084597 updates systems to:
- OS Build 26200.7982 (Windows 11 25H2)
- OS Build 26100.7982 (Windows 11 24H2)
Deployment Notes
- Hotpatch‑enabled devices install this automatically.
- No restart is required.
- Microsoft reports no known issues with this update.
Why It Matters for Security Teams
For environments using RRAS—even indirectly—this patch closes a path where a compromised or malicious server could escalate to code execution on an admin workstation, which is a high‑value target. The no‑reboot nature also makes it easier to deploy quickly across production systems.
Given your role overseeing infrastructure and security, this update is one you’d want to ensure is applied across any hotpatch‑eligible endpoints, especially admin workstations or servers with RRAS tooling installed.
.png)