Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2026-26115

Опубликовано: 10 мар. 2026
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

SQL Server Elevation of Privilege Vulnerability

Improper validation of specified type of input in SQL Server allows an authorized attacker to elevate privileges over a network.

FAQ

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain SQL sysadmin privileges.

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the following table, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.

Update NumberTitleVersionApply if current product version is…This security update also includes servicing releases up through…
5077466Security update for SQL Server 2025 CU2+GDR17.0.4020.2 17.0.4006.2 - 17.0.4015.4KB5075211 - Previous SQL2025 RTM CU2
5077468Security update for SQL Server 2025 RTM+GDR17.0.1105.2 17.0.1000.7 - 17.0.1050.2KB5073177 - Previous SQL2025 RTM GDR
5077464Security update for SQL Server 2022 CU23+GDR16.0.4240.4 16.0.4003.1 - 16.0.4236.2KB5078297 - Previous SQL2022 RTM CU23
5077465Security update for SQL Server 2022 RTM+GDR16.0.1170.5 16.0.1000.6 - 16.0.1165.1KB5073031 - Previous SQL2022 RTM GDR
5077469Security update for SQL Server 2019 CU32+GDR15.0.4460.4 15.0.4003.23 - 15.0.4455.2KB 5068404 - Previous SQL2019 RTM CU32 GDR
5077470Security update for SQL Server 2019 RTM+GDR15.0.2160.4 15.0.2000.5 - 15.0.2155.2KB 5068405 - Previous SQL2019 RTM GDR
5077471Security update for SQL Server 2017 CU31+GDR14.0.3520.4 14.0.3006.16 - 14.0.3515.1KB 5068402 - Previous SQL2017 RTM CU31 GDR
5077472Security update for SQL Server 2017 RTM+GDR14.0.2100.4 14.0.1000.169 - 14.0.2095.1KB 5068403 - Previous SQL2017 RTM GDR
5077473Security update for SQL Server 2016 Azure Connect Feature Pack+GDR13.0.7075.5 13.0.7000.253 - 13.0.7070.1KB 5068400 - Previous SQL2016 Azure Connect Feature Pack GDR
5077474Security update for SQL Server 2016 SP3+GDR13.0.6480.4 13.0.6300.2 - 13.0.6475.1KB 5068401 - Previous SQL2016 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then choose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.

How could an attacker exploit this vulnerability?

An authenticated attacker with explicit permissions could exploit the vulnerability by logging in to the SQL server and could then elevate their privileges to sysadmin.

Обновления

ПродуктСтатьяОбновление
Microsoft SQL Server 2017 for x64-based Systems (GDR)
Microsoft SQL Server 2019 for x64-based Systems (GDR)
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR)
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack
Microsoft SQL Server 2017 for x64-based Systems (CU 31)
Microsoft SQL Server 2022 for x64-based Systems (GDR)
Microsoft SQL Server 2019 for x64-based Systems (CU 32)
Microsoft SQL Server 2025 for x64-based Systems (GDR)
Microsoft SQL Server 2025 for x64-based Systems (CU2)
Microsoft SQL Server 2022 for x64-based Systems (CU 23)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

EPSS

Процентиль: 28%
0.00104
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
16 дней назад

Improper validation of specified type of input in SQL Server allows an authorized attacker to elevate privileges over a network.

CVSS3: 8.8
github
16 дней назад

Improper validation of specified type of input in SQL Server allows an authorized attacker to elevate privileges over a network.

CVSS3: 8.8
fstec
17 дней назад

Уязвимость системы управления базами данных Microsoft SQL Server, связанная с неправильной проверкой указанного типа входных данных, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 28%
0.00104
Низкий

8.8 High

CVSS3