Out-of-Band Patch for Windows (and why it matters)


 


Windows 11 (25H2, 24H2, and LTSC 2024) that Microsoft released on March 13–14, 2026 to fix critical RRAS remote code execution vulnerabilities. It installs without requiring a reboot on systems that support hotpatching.

What KB5084597 Addresses

Microsoft issued this update to patch three RRAS (Routing and Remote Access Service) management tool vulnerabilities:

  • CVE‑2026‑25172 — RRAS RCE
  • CVE‑2026‑25173 — RRAS RCE
  • CVE‑2026‑26111 — RRAS RCE

These flaws stem from an integer overflow/wraparound condition. If an administrator’s RRAS management tool connects to a malicious remote server, an attacker could:

  • Disrupt the RRAS management tool
  • Execute code on the administrator’s device

This makes the vulnerabilities particularly dangerous in enterprise environments where RRAS is used for VPN, NAT, routing, and site‑to‑site connectivity.

Why This Update Is Out‑of‑Band

Microsoft released KB5084597 outside the normal Patch Tuesday cycle because the vulnerabilities are considered high‑risk. The hotpatch mechanism allows Microsoft to:

  • Deliver the fix immediately
  • Avoid requiring a system restart
  • Minimize downtime for enterprise systems

Hotpatching is available only on eligible Windows 11 24H2/25H2 and LTSC 2024 systems that meet Microsoft’s prerequisites.

Affected OS Builds After Installation

KB5084597 updates systems to:

  • OS Build 26200.7982 (Windows 11 25H2)
  • OS Build 26100.7982 (Windows 11 24H2)

Deployment Notes

  • Hotpatch‑enabled devices install this automatically.
  • No restart is required.
  • Microsoft reports no known issues with this update.

Why It Matters for Security Teams

For environments using RRAS—even indirectly—this patch closes a path where a compromised or malicious server could escalate to code execution on an admin workstation, which is a high‑value target. The no‑reboot nature also makes it easier to deploy quickly across production systems.

Given your role overseeing infrastructure and security, this update is one you’d want to ensure is applied across any hotpatch‑eligible endpoints, especially admin workstations or servers with RRAS tooling installed.


Popular posts from this blog

WSUS CVE-2025-59287 Mitigation

Cloud Infrastructures are Having a Bad Week

CVE-2025-58034 Fortinet Warnings and Mitigation