On March 13, 2026, Microsoft took the urgent step of releasing an out-of-band hotpatch, KB5084597, to remediate three critical vulnerabilities in the Windows Routing and Remote Access Service (RRAS). The flaws, tracked as CVE-2026-25172, CVE-2026-25173, and CVE-2026-26111, could enable remote code execution (RCE) on affected systems. The vulnerabilities reside in the RRAS management tool and can be exploited if an administrator is tricked into connecting to a malicious server. Given that RRAS is a fundamental component for enterprise VPN and routing, these vulnerabilities present a significant risk. The update is available for Windows 11 versions 25H2 and 24H2 and is being deployed automatically to devices enrolled in Windows Autopatch, with a zero-reboot installation for enabled systems.
The emergency patch addresses three distinct vulnerabilities within the RRAS management tool:
CVE-2026-25172, CVE-2026-25173, CVE-2026-26111: While Microsoft has not provided deep technical specifics for each CVE, the collective threat allows for remote code execution. The attack vector requires an authenticated user (such as a network administrator) to connect their RRAS management tool to a malicious server controlled by the attacker. This interaction triggers the vulnerability.The attack requires user interaction, but the target audience—network administrators with privileged access—makes any successful exploitation highly impactful.
KB5084597 (Cumulative update that also includes the March 10 security update).As of the release, Microsoft has not indicated that these vulnerabilities are being actively exploited in the wild. However, the decision to issue an emergency out-of-band patch suggests that the flaws may be easily weaponized or that a proof-of-concept exploit is imminent. The 'Exploitation More Likely' assessment often accompanies such releases.
The business impact of these vulnerabilities is severe. RRAS is a cornerstone of remote access for many organizations, managing VPN connections and network routing. A successful RCE exploit on an administrator's machine could lead to a complete compromise of the network infrastructure. An attacker could:
The requirement for an administrator to connect to a malicious server means the attack is likely to be delivered via sophisticated social engineering or by compromising a legitimate server that the administrator trusts.
Hunting for exploitation of these vulnerabilities involves monitoring administrator activity and network traffic related to RRAS.
rrasmgmt.dll or related processesmmc.exe rrasmgmt.mscD3-RAPA - Resource Access Pattern Analysis.mmc.exe and its loaded modules (rrasmgmt.dll). Alert on any attempts by these processes to launch shells or write to sensitive system locations.KB5084597 update immediately across all affected Windows 11 systems. Utilize Windows Update, WSUS, or the Microsoft Update Catalog. This is a direct application of D3FEND's D3-SU - Software Update.M1035 - Limit Access to Resource Over Network.Immediately apply the KB5084597 security update to all affected Windows 11 systems.
Mapped D3FEND Techniques:
Restrict outbound RRAS management traffic from administrator workstations to only known, trusted servers.
Mapped D3FEND Techniques:
Use just-in-time (JIT) access for administrative tasks and separate administrative accounts from standard user accounts to limit exposure.
Mapped D3FEND Techniques:
Microsoft releases emergency hotpatch KB5084597 for critical RRAS vulnerabilities.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.