Tracked as KB5084597 and targeting OS Builds 26200.7982 and 26100.7982, this update patches three actively concerning flaws in the Windows Routing and Remote Access Service (RRAS) management tool, and notably, it does so without requiring a device restart.
The core focus of this hotpatch is a trio of vulnerabilities in the Windows RRAS component, a service that manages remote connectivity and VPN functionality in enterprise and consumer environments.
The three CVEs addressed are:
The common attack scenario across all three CVEs involves an attacker setting up a rogue server and waiting for a user or administrator running the RRAS management tool to initiate a connection.
Once connected, the attacker can disrupt the tool’s functionality or, more critically, execute malicious code directly on the victim’s machine. This type of attack is particularly dangerous in enterprise environments where remote access management is routine.
Unlike standard monthly security updates, hotpatches are designed to apply critical fixes to running processes in memory without interrupting workflows.
Devices enabled for hotpatching receive and install the update silently, with no restart required for it to take effect. This approach significantly reduces downtime, especially valuable for enterprise deployments managing large fleets of machines.
It is important to note that this hotpatch is only available for hotpatch-enabled devices. Devices receiving standard Windows updates are not offered this specific package.
Microsoft also bundles the latest Servicing Stack Update (SSU) — KB5083532, version 26100.8035 — alongside the hotpatch to ensure the update infrastructure itself remains current.
This update applies to:
For hotpatch-enabled devices, the update is downloaded and installed automatically through Windows Update, with no manual intervention required. Administrators can also access the package through the Microsoft Update Catalog or Server Update Services (WSUS) for managed environments.
Microsoft reports no known issues with this update at the time of publication, and devices that have already applied previous updates will only download the new changes included in this package.
Security teams should verify that hotpatch functionality is enabled across eligible endpoints. For organizations that rely heavily on RRAS for remote access management, confirming the installation of updates should be a priority, given the potential for remote code execution these vulnerabilities pose.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Microsoft Releases Out-of-Band Patch For Critical RRAS RCE Vulnerabilities in Windows 11 appeared first on Cyber Security News.
ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, has recently observed a surge…
Microsoft has released an out-of-band hotpatch, KB5084897, addressing a critical Bluetooth device visibility issue impacting…
Microsoft has announced the release of an AI-powered troubleshooting capability for Microsoft Purview Data Lifecycle…
Illinois Senate Bill 3104 aims to make it easier for residents, including renters and condominium…
The first trailer for Dune: Part 3 has arrived, and it gives us our best…
Hulu’s hit new show Paradise has officially been renewed for its third season, just under…
This website uses cookies.