
Microsoft has issued an out-of-band safety replace to deal with a number of important vulnerabilities in Home windows 11 that might permit attackers to execute malicious code by way of the system’s distant entry administration instruments.
The patch targets flaws within the Home windows Routing and Distant Entry Service (RRAS) and is being delivered as a hotpatch, permitting programs to obtain the repair with out requiring a restart.
If a person connects to a malicious distant server, “… an attacker might disrupt the device or run code in your gadget,” Microsoft warns in its advisory.
Contained in the Home windows RRAS vulnerabilities
The replace addresses three vulnerabilities within the Home windows RRAS administration device.
RRAS performs a important position in lots of enterprise networks by enabling directors to handle distant entry providers, together with VPN connectivity, routing features, and distant administration.
The failings are tracked as CVE-2026-25172, CVE-2026-25173, and CVE-2026-26111, every of which might permit an attacker to execute arbitrary code or disrupt system operations below sure situations.
CVE-2026-25172
CVE-2026-25172 is a distant code execution vulnerability within the RRAS administration device that may be triggered when a person or administrator connects to a malicious server by way of the RRAS interface.
A specifically crafted response from the attacker-controlled server might permit the attacker to disrupt service operations or execute arbitrary code on the sufferer’s system, probably giving the attacker management over the affected gadget.
CVE-2026-25173
CVE-2026-25173 is a associated vulnerability affecting the identical RRAS administration part.
Just like CVE-2026-25172, exploitation happens when a person or administrator connects to an attacker-controlled server. As soon as the connection is established, the attacker might be able to execute code on the sufferer system or set off a denial-of-service situation that disrupts RRAS performance.
CVE-2026-26111
CVE-2026-26111 is a further vulnerability within the RRAS administration device that additional will increase the danger of distant code execution throughout interactions with malicious servers.
Whereas the exploitation situation is comparable, this flaw compounds the general risk by offering one other pathway for attackers to execute malicious code or destabilize the service throughout distant administration operations.
All three vulnerabilities share the same assault situation centered on how the RRAS administration device interacts with distant servers.
In a possible exploitation situation, an attacker might configure a malicious or rogue server designed to work together with the RRAS interface. If a system administrator or person makes an attempt to connect with that server by way of the administration device, the malicious server might exploit the vulnerability through the connection course of.
Though exploitation requires person interplay, the vulnerabilities are notably harmful as a result of RRAS operates with elevated privileges. This probably permits attackers to deploy malware, alter community configurations, or achieve a foothold for lateral motion.
Microsoft didn’t report any energetic exploitation of those vulnerabilities of their advisory.
How organizations can scale back RRAS threat
As a result of RRAS providers typically function with elevated privileges and play a central position in enterprise connectivity, a profitable compromise might have vital operational and safety impacts.
Organizations ought to implement layered defenses that restrict publicity, prohibit administrative entry, and enhance visibility.
- Apply the newest patch to affected Home windows 11 programs and take a look at it in a staging atmosphere earlier than deploying it to manufacturing.
- Limit RRAS administration entry to licensed directors solely utilizing role-based entry management (RBAC), privileged entry administration, or just-in-time (JIT) entry to cut back the variety of customers who can provoke distant connections.
- Disable the RRAS position or administration instruments on programs the place they aren’t required to cut back the general assault floor and restrict alternatives for exploitation.
- Limit connections to trusted distant servers and implement outbound community filtering or firewall guidelines to stop administrative programs from connecting to unknown or attacker-controlled hosts.
- Section distant entry infrastructure and administrative workstations onto devoted administration networks to restrict lateral motion if a system is compromised.
- Deploy EDR and centralized logging to watch for suspicious RRAS exercise, uncommon outbound connections, or surprising course of execution tied to distant entry instruments.
- Repeatedly take a look at incident response plans and use assault simulation instruments with eventualities across the exploitation of distant administration instruments.
Collectively, these measures may help organizations scale back publicity to RRAS-related threats whereas strengthening total resilience in opposition to makes an attempt to use distant administration infrastructure.
This text initially appeared on our sister web site, eSecurityPlanet.