Microsoft has released an out-of-band hotpatch update, KB5084597 addressing security vulnerabilities affecting certain Windows 11 Enterprise devices that receive hotpatch updates instead of regular cumulative updates. All Windows 11 versions 24H2, 25H2, and Windows 11 Enterprise LTSC 2024 devices enrolled in the hotpatch program via Windows Autopatch need updates. The flaws affect the Windows RRAS management tool, allowing RCE if an administrator connects to a malicious server during remote management operations. CVE-2026-25172, CVE-2026-25173, and CVE-2026-26111 vulnerabilities existing within the RRAS management snap-in used by administrators to configure and manage remote routing services. Microsoft states that a domain authenticated attacker could exploit the issue by tricking a domain-joined user into sending a request to a malicious server through the RRAS management interface. As connection is established, the malicious server could deliver specially crafted responses triggering the vulnerability, potentially allowing the attacker to execute arbitrary code on the administrator’s device. The vulnerabilities stem from improper handling of remote server responses within the RRAS management tool. When an administrator initiates a connection to manage a remote RRAS server, the snap-in processes network data returned by the target system. A malicious server can manipulate these responses causing memory corruption or unsafe operations, leading to RCE. Although March 2026 Patch Tuesday updates address these vulnerabilities, those cumulative patches require a system reboot, which may not be feasible for mission-critical enterprise systems. To mitigate the risk, organizations should ensure affected systems receive the KB5084597 hotpatch through Windows Autopatch. Administrators should restrict RRAS management access, apply least-privilege policies, and monitor connections to remote servers for suspicious activity. Prompt patch deployment and secure administrative practices can help reduce the risk of exploitation while maintaining operational uptime without requiring immediate system restarts.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...