[CIVN-2026-0147] Multiple Remote Code Execution Vulnerabilities in Windows Routing and Remote Access Service (RRAS)

By Published On: March 22, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Remote Code Execution Vulnerabilities in Windows Routing and Remote Access Service (RRAS)


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Microsoft Windows Routing and Remote Access Service (RRAS) versions prior to OS Builds 26200.7982 and 26100.7982

Overview


Multiple vulnerabilities have been reported in Microsoft Windows Routing and Remote Access Service (RRAS) which could allow an attacker to execute arbitrary code on the targeted system in the context of RRAS service.


Target Audience:

All System administrators, Network administrators and organizations using Microsoft Windows systems with RRAS enabled.


Risk Assessment:

High risk of remote code execution, unauthorized access, system compromise.


Impact Assessment:

Potential for data theft, execution of malicious code, unauthorized actions on the affected system.


Description


Windows Routing and Remote Access Service (RRAS) is a Microsoft Windows component that provides routing, remote access and VPN services for enterprise environments.


Multiple vulnerabilities exist in the RRAS management component due to improper handling of memory conditions such as integer overflow or wraparound. An attacker could exploit these vulnerabilities by tricking a user into connecting to a specially crafted or malicious remote server via the RRAS snap-in.


Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code on the targeted system in the context of RRAS service.


Solution


Apply appropriate software updates as mentioned:

https://support.microsoft.com/en-us/topic/march-13-2026-hotpatch-kb5084597-os-builds-26200-7982-and-26100-7982-out-of-band-ef323fee-e70f-4f43-8bbc-1021c435bf5c


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25172


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25173


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26111



Vendor Information


Microsoft

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25172

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25173

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26111


References


Microsoft

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25172

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25173

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26111


CVE Name

CVE-2026-25172

CVE-2026-25173

CVE-2026-26111




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmm/ekkACgkQ3jCgcSdc

ys+JsA//fwW3fqkrBj3MqnqfSWmAMRhDt26chxjJhFLY4ZYPFIRpPUssRRe4+NpB

zSj88Ct4UvY6kYDl2uxtoXKhDtu1zWhPuXOmeVE550NLgCsNg2wei9MzTLxjxcxk

TnlwVvRhmtGl/tN3ASJkesITOTLfQOWlzN4zw566wXNBhrJFaZmbuzirQLdJ0RmY

lZ3qbIgy5jS1K9UyefvLO/txeLIZWR+22A2gMqP59xDQH97jLH8JYY6RvZNThNty

tQv8OyaCHMGfEyqc30QE/fMDqz4dFXj9jOHVS2hnQDn+zO7vOKdnptanS2cLOSOQ

TqoSZyQywNlLCPt0RTPDd5g8wj0XZ48/+GiiVolGJUL3CL5O73pt+mBWOIsJdHYX

obyJ75KCMY/yQytsK17Y6HkImNFP5C36QGYegyLNNmu48aHLbkkyLs0J36dre1wS

7cs6t4q6IXjUcCRRsWeIftpt2gb78c+bsoZ9fbnvMbl491KaJ46dF1YyBG2PmW61

RS7pvbPMJerJ9jWUGT4/+DcrWDCnkAeV1mReDEE+FeS8jFO893WJGt8td9c4m0as

ly0FqAte3IewHYTP0l0dX3yuIopBLDlb9V1D/pUTVOvzDOrX5D3FdnSpUlgJ6jdT

JhXUMjrNNtanccsn5jYp67LOE5sHbyUsBmDXJIrCWeNnotK9fG0=

=icSs

—–END PGP SIGNATURE—–

Share this article