Microsoft Hotpatch fixes critical RRAS failure that could allow remote code execution without reboot

Published 4 min de lectura 100 reading

Microsoft launched an off-cycle update yesterday for Windows 11 Enterprise teams that receive the so-called hotpatches instead of the usual cumulative updates on the second Tuesday of each month. The correction, distributed as KB5084597, addresses failures in the RRAS management tool that could allow remote code execution if a computer connects to a malicious server.

According to Microsoft, the resolved vulnerabilities are identified as CVE-2026-25172, CVE-2026-25173 and CVE-2026-26111. In all three cases, the attack requires a user of a computer attached to the domain to be deceived for the RRAS console to establish a connection to a server controlled by the attacker, which could result in the execution of code on the administrative machine.

Microsoft Hotpatch fixes critical RRAS failure that could allow remote code execution without reboot
Image generated with IA.

The KB5084597 hotpatch covers Windows 11 facilities in the 25H2 and 24H2 versions, as well as Windows 11 Enterprise LTSC 2024 systems. Microsoft clarifies that these corrections were already part of the security updates published in the March Patch Tuesday, but have been reissued in hotpatch format to ensure coverage in scenarios where a scheduled restart is not viable as in equipment that supports critical services and must remain in continuous operation.

The key difference between a normal cumulative update and a hotpatch is its application mode. While accumulations usually require reboot the system so that disk files are updated and processes are reinitiated, hotpatches apply memory changes to mitigate vulnerabilities without interrupting running services and, at the same time, update the disk files so that the correction persists after the next start. Microsoft explains this mechanism and its management within Windows Autopatch in its dedicated documentation to hotpatch updates.

It is important to stress that this hotpatch will be offered alone a devices that are registered in the hotpatch program and managed by Windows Autopatch; in these equipment the update is installed automatically and without request for reboot. For the rest of the environments, protection against these failures continues to be the installation of cumulative updates published in March and, if not managed by Autopatch, plan the necessary restart to complete the repair.

From a practical and security perspective, there are several conclusions and steps that any infrastructure manager should consider. First, check which machines of the organization are registered in Windows Autopatch and, if not, prioritize the installation of cumulative updates and schedule the restart in maintenance windows. Second, limit the use of administrative consoles and prevent management equipment from connecting to unreliable servers; the risk described depends precisely on the RRAS tool being connected to a malicious end. Third, review network segmentation and access policies to reduce the exposure of administrative stations to unverified external servers.

Microsoft Hotpatch fixes critical RRAS failure that could allow remote code execution without reboot
Image generated with IA.

Microsoft already indicated that it had published previous hotfixes for these failures and that the distributed version now aims to closing gaps in all affected scenarios. Even so, managers should read the KB technical input and vulnerability pages to understand the exact scope and confirm the steps to be taken in their environment. The hotpatch support note is available on the Microsoft page mentioned above, and the detailed entries of each CVE can be found in the Microsoft security catalog: Microsoft Security Response Center.

If you manage equipment that is not part of the hotpatch program and cannot allow frequent restarts, it is appropriate to plan an additional mitigation strategy: to restrict remote administration through controlled networks, to use dedicated management stations with the minimum installed software, and to apply access controls that reduce the likelihood that an authenticated user is induced to establish connections with malicious servers.

In short, the emergence of KB5084597 recalls two simple but relevant ideas: the first, that remote management tools can become attack vectors if the connections they make are not controlled; the second, that technologies such as hotpatch seek to compensate for the operational limitations of critical environments, allowing to correct vulnerabilities without immediate rebeginning. For more information and to download the update if applicable, please refer to the Microsoft support note and the pages of the CVE that we link to above.

Coverage

Related

More news on the same subject.