On March 13, 2026, Microsoft took the urgent step of releasing an out-of-band hotpatch, KB5084597, to remediate three critical vulnerabilities in the Windows Routing and Remote Access Service (RRAS). The flaws, tracked as CVE-2026-25172, CVE-2026-25173, and CVE-2026-26111, could enable remote code execution (RCE) on affected systems. The vulnerabilities reside in the RRAS management tool and can be exploited if an administrator is tricked into connecting to a malicious server. Given that RRAS is a fundamental component for enterprise VPN and routing, these vulnerabilities present a significant risk. The update is available for Windows 11 versions 25H2 and 24H2 and is being deployed automatically to devices enrolled in Windows Autopatch, with a zero-reboot installation for enabled systems.
The emergency patch addresses three distinct vulnerabilities within the RRAS management tool:
CVE-2026-25172, CVE-2026-25173, CVE-2026-26111: While Microsoft has not provided deep technical specifics for each CVE, the collective threat allows for remote code execution. The attack vector requires an authenticated user (such as a network administrator) to connect their RRAS management tool to a malicious server controlled by the attacker. This interaction triggers the vulnerability.The attack requires user interaction, but the target audience—network administrators with privileged access—makes any successful exploitation highly impactful.
KB5084597 (Cumulative update that also includes the March 10 security update).As of the release, Microsoft has not indicated that these vulnerabilities are being actively exploited in the wild. However, the decision to issue an emergency out-of-band patch suggests that the flaws may be easily weaponized or that a proof-of-concept exploit is imminent. The 'Exploitation More Likely' assessment often accompanies such releases.
The business impact of these vulnerabilities is severe. RRAS is a cornerstone of remote access for many organizations, managing VPN connections and network routing. A successful RCE exploit on an administrator's machine could lead to a complete compromise of the network infrastructure. An attacker could:
The requirement for an administrator to connect to a malicious server means the attack is likely to be delivered via sophisticated social engineering or by compromising a legitimate server that the administrator trusts.
Hunting for exploitation of these vulnerabilities involves monitoring administrator activity and network traffic related to RRAS.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| network_traffic_pattern | RRAS management connections to untrusted IPs | Monitor for connections from administrator workstations using the RRAS protocol (e.g., PPTP, L2TP) to IP addresses outside of the known corporate or partner ranges. | Firewall logs, NetFlow data | high |
| process_name | rrasmgmt.dll or related processes |
Look for anomalous behavior associated with RRAS management processes, such as unexpected child processes or memory corruption errors. | EDR logs, Windows System Event Log | medium |
| log_source | Windows RRAS event logs | A sudden spike in errors or unexpected disconnection/connection events in the RRAS logs could indicate an attempted exploit. | Windows Event Viewer (Routing and Remote Access logs) | medium |
| command_line_pattern | mmc.exe rrasmgmt.msc |
Monitor for unusual command-line arguments or execution patterns of the RRAS management console. | EDR process creation logs | low |
D3-RAPA - Resource Access Pattern Analysis.mmc.exe and its loaded modules (rrasmgmt.dll). Alert on any attempts by these processes to launch shells or write to sensitive system locations.KB5084597 update immediately across all affected Windows 11 systems. Utilize Windows Update, WSUS, or the Microsoft Update Catalog. This is a direct application of D3FEND's D3-SU - Software Update.M1035 - Limit Access to Resource Over Network.Immediately apply the KB5084597 security update to all affected Windows 11 systems.
Mapped D3FEND Techniques:
Restrict outbound RRAS management traffic from administrator workstations to only known, trusted servers.
Mapped D3FEND Techniques:
Use just-in-time (JIT) access for administrative tasks and separate administrative accounts from standard user accounts to limit exposure.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats