← Back to Cybersecurity News Center
Severity
HIGH
Priority
0.275
×
Tip
Pick your view
Analyst for full detail, Executive for the short version.
Analyst
Executive
Executive Summary
Microsoft issued an emergency out-of-band hotpatch (KB5084597) on March 14, 2026, to fix a remote code execution vulnerability in the Windows Routing and Remote Access Service (RRAS), affecting Windows 11 Enterprise 24H2 and 25H2 endpoints enrolled in the hotpatch update channel. The out-of-band release cadence signals Microsoft judged the risk urgent enough to bypass the standard Patch Tuesday schedule. Unpatched enterprise endpoints with RRAS exposed to the network are at risk of full remote compromise without user interaction. **ADVISORY STATUS: CVE identifier is pending MSRC publication. CVSS vector and EPSS score are unconfirmed. This item is sourced from secondary reporting only (T3 tier). Priority and detection guidance should be reassessed once MSRC publishes the canonical advisory with CVE ID assignment.**
Impact Assessment
CISA KEV Status
Not listed
Attack Vector
HIGH
Exploitable remotely over the internet
Complexity
LOW
Requires specific conditions or configurations
Authentication
MEDIUM
Basic user credentials required
User Interaction
MEDIUM
Requires victim to click, open, or interact
Active Exploitation
LOW
No confirmed active exploitation
Affected Product
INFO
Windows 11 Enterprise (hotpatch update channel, versions 24H2 and 25H2); Microsoft Routing and Remote Access Service (RRAS)
Are You Exposed?
⚠
You use Windows 11 Enterprise (hotpatch update channel, versions 24H2 and 25H2); Microsoft Routing and Remote Access Service (RRAS) → Investigate immediately
⚠
Affected systems are internet-facing → Increased attack surface
✓
You have patched to the latest version → Reduced risk
✓
Systems are behind network segmentation / WAF → Mitigated exposure
Assessment estimated from CVSS base score (no vector available)
Business Context
Microsoft issued an emergency out-of-band hotpatch (KB5084597) on March 14, 2026, to fix a remote code execution vulnerability in the Windows Routing and Remote Access Service (RRAS), affecting Windows 11 Enterprise 24H2 and 25H2 endpoints enrolled in the hotpatch update channel. The out-of-band release cadence signals Microsoft judged the risk urgent enough to bypass the standard Patch Tuesday schedule. Unpatched enterprise endpoints with RRAS exposed to the network are at risk of full remote compromise without user interaction. **ADVISORY STATUS: CVE identifier is pending MSRC publication. CVSS vector and EPSS score are unconfirmed. This item is sourced from secondary reporting only (T3 tier). Priority and detection guidance should be reassessed once MSRC publishes the canonical advisory with CVE ID assignment.**
Technical Analysis
KB5084597 addresses a remote code execution vulnerability in the Windows Routing and Remote Access Service (RRAS) on Windows 11 Enterprise versions 24H2 and 25H2 enrolled in the hotpatch update channel.
Two CWE classes are associated: CWE-94 (Improper Control of Generation of Code) and CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), suggesting the vulnerability may involve memory corruption or code injection within the RRAS process.
CVSS base score is reported at 7.5 (High); the CVSS vector is pending confirmation from MSRC advisory.
No CVE identifier has been officially assigned in available source material at time of analysis; assignment is expected following MSRC publication. MITRE ATT&CK techniques relevant to this vulnerability class include T1210 (Exploitation of Remote Services), T1133 (External Remote Services), and T1572 (Protocol Tunneling), reflecting RRAS's role in VPN and routing infrastructure. EPSS score and CISA KEV status are unconfirmed; no active exploitation has been disclosed in available sources. Attack surface is limited to endpoints enrolled in the hotpatch channel with RRAS running and network-accessible.
Action Checklist IR ENRICHED
Triage Priority:
IMMEDIATE
Escalate to CISO and IR leadership if any Windows 11 Enterprise 24H2/25H2 endpoint with RRAS remains unpatched and exposed to untrusted networks (including internet) for more than 48 hours after OOB release, or if evidence of exploitation attempts is detected in any RRAS event log, network flow, or IDS alert.
1
Step 1 (Immediate): Verify KB5084597 deployment status on all Windows 11 Enterprise 24H2 and 25H2 endpoints enrolled in the hotpatch update channel. Prioritize systems where RRAS is active and network-exposed. Apply the patch immediately to any unpatched endpoints.
IR Detail
Preparation
NIST 800-61r3 §2.1 (preparation phase; patch management and inventory control)
NIST 800-53 SI-2 (Flaw Remediation)
CIS Controls v8 2.3 (Address Unauthorized Software)
CIS Controls v8 3.10 (Disable Dormant Accounts)
Compensating Control
Use 'Get-HotFix' PowerShell cmdlet on each endpoint to query installed KB articles; pipe to CSV for triage: Get-HotFix | Where-Object {$_.HotFixID -eq 'KB5084597'} | Export-Csv hotpatch_status.csv. Cross-reference against Active Directory computer list using dsquery or ADO queries. For air-gapped networks, export inventory from WSUS server using: wuauclt /reportnow, then review %SystemRoot%\CCM\Logs\WUAHandler.log.
Preserve Evidence
Before patching, capture: (1) Windows Update event log (Application channel, Event ID 19, 20, 25 for update status); (2) Registry HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run and scheduled tasks for persistence mechanisms; (3) Network baseline (netstat -ano | findstr :80,:443,:1194 to capture existing RRAS listeners); (4) Process snapshot using Get-Process -IncludeUserName for rasman.exe parent-child relationships.
2
Step 2 (Detection): Query endpoint management tools (Intune, SCCM, or equivalent) for hotpatch enrollment status and KB5084597 installation confirmation. Cross-reference against your Windows 11 Enterprise 24H2/25H2 inventory.
IR Detail
Detection & Analysis
NIST 800-61r3 §3.2.1 (detection and analysis; identifying and understanding indicators)
NIST 800-53 CA-7 (Continuous Monitoring)
CIS Controls v8 8.1 (Unified Endpoint Management)
CIS Controls v8 8.2 (Address Unauthorized Software)
Compensating Control
If no MDM is in place, use Group Policy audit exports: gpresult /h report.html on each endpoint, extract applied policies. Query Windows Update history via: Get-WmiObject -Class Win32_QuickFixEngineering | ConvertTo-Csv > patches.csv. For heterogeneous environments, deploy a scheduled task (PowerShell script running as SYSTEM) to report patch status to a central log aggregation point (Splunk, ELK, syslog) every 12 hours.
Preserve Evidence
Before querying, preserve: (1) Intune/SCCM device compliance reports (export as baseline); (2) Windows Update Agent log (C:\Windows\Logs\WindowsUpdate\WindowsUpdate.log); (3) Task Scheduler history for update tasks; (4) Group Policy Operational event logs (Event ID 5312, 5313 for policy application failures that may explain deployment gaps).
3
Step 3 (Assessment): Identify all endpoints running RRAS. Assess whether RRAS is exposed to untrusted networks, particularly internet-facing or DMZ-adjacent systems. Prioritize those for immediate patching and interim network controls if patching is delayed.
IR Detail
Preparation
NIST 800-61r3 §2.1 (asset inventory and risk prioritization)
NIST 800-53 CM-8 (Information System Component Inventory)
NIST 800-53 CA-8 (Security Assessments)
CIS Controls v8 1.1 (Establish and Maintain Detailed Asset Inventory)
Compensating Control
Query RRAS service status across domain: use Invoke-Command with New-PSSession to run 'Get-Service -Name RemoteAccess' against endpoint lists. Parse output and correlate with network topology (VLAN assignments, DMZ status). Use netstat -ano and netsh advfirewall show rule name=all | findstr RRAS to identify listening ports. For zero-trust assessment, cross-reference against firewall rules: PowerShell: Get-NetFirewallRule -Direction Inbound | Where-Object {$_.Name -like '*RRAS*'} | Get-NetFirewallPortFilter.
Preserve Evidence
Capture before assessment: (1) System role indicators (Get-WindowsFeature | grep -i RRAS for role-based assessment); (2) Network interface bindings (ipconfig /all, route print); (3) Active listening sockets (netstat -anob output with process association); (4) Firewall inbound rules configured for RAS (Export-NetFirewallRule); (5) VPN connection history in Event ID 20225 (Routing and Remote Access operational log).
4
Step 4 (Interim Control): If patching cannot be completed immediately, consider disabling RRAS on non-essential systems or restricting RRAS traffic at the network boundary using firewall ACLs or NSGs to reduce exposure surface.
IR Detail
Containment
NIST 800-61r3 §3.2.5 (containment strategy; network segmentation)
NIST 800-53 AC-3 (Access Enforcement)
NIST 800-53 SC-7 (Boundary Protection)
CIS Controls v8 3.3 (Configure Data Access Control Lists)
CIS Controls v8 12.3 (Segment Network Based on Sensitivity)
Compensating Control
Disable RRAS on non-critical systems via: Disable-WindowsOptionalFeature -Online -FeatureName RasSrv -NoRestart, then restart. For network-boundary controls on resource-constrained networks, use Windows Defender Firewall rules: netsh advfirewall firewall add rule name='Block_RRAS_Inbound' dir=in action=block protocol=tcp localport=443,1194 remoteip=0.0.0.0/0. For on-premises firewalls without NSG, configure ACLs blocking TCP 443, 1194, and UDP 500/4500 (IPSec) from untrusted segments. Document each interim control with rollback procedure and business owner sign-off.
Preserve Evidence
Before applying controls, snapshot: (1) Current RRAS service state and startup type (Get-Service RemoteAccess, Get-ItemProperty HKLM:\System\CurrentControlSet\Services\RemoteAccess | select Start); (2) Active RAS connections (rasphone /showstatus, RAS event log Event ID 20226); (3) Firewall baseline (Export-NetFirewallRule > baseline_rules.csv); (4) Network traffic baseline (netsh trace start capture=yes tracefile=rras_baseline.etl, let run 1 hour, netsh trace stop).
5
Step 5 (Communication): Notify IT operations and endpoint management teams of the OOB release. Confirm patch deployment timelines with system owners for any deferred endpoints. Document exceptions with business justification.
IR Detail
Preparation
NIST 800-61r3 §2.2 (tools and resources; communication protocols)
NIST 800-53 IR-4 (Incident Handling)
CIS Controls v8 16.1 (Establish an Incident Response Program)
Compensating Control
Create incident ticket with OOB advisory metadata: CVE N/A, KB5084597, CVSS 7.5, affected versions 24H2/25H2, release date 2026-03-14. Use ticketing system or shared spreadsheet to track: endpoint name, RRAS status, patch date, owner approval, deferral reason (if applicable). Send notification via email with subject line '[URGENT] KB5084597 RRAS RCE Hotpatch Deployment Required by [DATE]' and include link to MSRC advisory. For deferred systems, require written business justification (template: system name | owner | reason | interim controls applied | target patch date) signed by manager.
Preserve Evidence
No forensic capture required for this communication step, but preserve: (1) Email notification send logs; (2) Ticket creation timestamps; (3) Owner acknowledgment signatures (screenshots or approval records); (4) List of deferred endpoints with documented justifications for audit trail.
6
Step 6 (Monitoring): Increase log retention and alerting sensitivity on RRAS-hosting systems for anomalous inbound connection attempts, unexpected process spawning from RRAS-related services (svchost hosting rasman/rras), or privilege escalation events. Update detection rules once MSRC publishes canonical CVE details and EPSS data.
IR Detail
Detection & Analysis
NIST 800-61r3 §3.2.2 (detection; signature and anomaly-based analysis)
NIST 800-53 AU-12 (Audit Generation)
NIST 800-53 IR-4 (Incident Handling)
CIS Controls v8 8.5 (Collect Detailed Audit Logs)
Compensating Control
Enable Windows Event Logs: (1) Security (Event ID 4688 for process creation — enable command-line auditing via Group Policy 'Audit process creation' and 'Audit: Audit the use of Backup Restore privilege'); (2) System (Event ID 7001/7002 for service startup); (3) Routing and Remote Access operational log (rasman Event IDs 20225, 20226, 20219); (4) Sysmon (if available) for parent-child process relationships. For log retention, set minimum 90 days: wevtutil sl Security /ms:104857600 /rt:true (100 MB with overwrite protection). Create manual detection rules using log parsing: search for rasman.exe spawning child processes like cmd.exe, powershell.exe, or unusual network utilities (Process.ParentImage contains 'rasman' AND Process.Image NOT IN [expected_list]); search for inbound TCP connections to ports 443, 1194 from external segments with Event ID 4624 (logon success) correlation.
Preserve Evidence
Immediately configure and retain: (1) Windows Security Event Log (minimum 30-day retention; enable archival if capacity limited); (2) Routing and Remote Access Operational event log; (3) Sysmon operational log (if deployed); (4) Process creation audit events (Event ID 4688); (5) Network connection events (Event ID 5156 Firewall Allow); (6) Privilege escalation events (Event ID 4688 with elevated token elevation type); (7) RAS activity logs at C:\Windows\System32\LogFiles\RRAS\ if applicable.
7
Step 7 (Long-term): Review hotpatch channel enrollment coverage and patch SLA policies. Establish a process to track MSRC CVE publication and reassess priority once CVSS vector and EPSS data are confirmed by official advisory.
IR Detail
Post-Incident
NIST 800-61r3 §3.4 (post-incident activities; lessons learned and process improvement)
NIST 800-53 CA-2 (Security Assessments)
NIST 800-53 IR-2 (Incident Response Training)
CIS Controls v8 2.1 (Enable and Enforce Automatic Software Updates)
Compensating Control
Establish recurring MSRC monitoring: subscribe to Microsoft Security Update Guide RSS feed (https://msrc.microsoft.com/update-guide/rss) or use free MSRC API (https://api.msrc.microsoft.com/). Create monthly patch review process: (1) Extract published CVEs with CVSS and EPSS scores; (2) Prioritize using CVSS severity + EPSS percentile (e.g., CVSS 7.0+ AND EPSS >60th percentile = immediate); (3) Cross-reference against inventory of affected products; (4) Document SLA: e.g., 'Critical/Immediate patches within 7 days; High within 14 days; Medium within 30 days.' Review hotpatch enrollment: audit which device groups are enrolled (Intune/SCCM), identify gaps (e.g., branch offices, VPN-only endpoints), document coverage percentage by business unit. Conduct annual patch SLA review and update based on OOB incidents like this one.
Preserve Evidence
Preserve for post-incident review: (1) This incident ticket and timeline; (2) Patch deployment logs (Windows Update logs, SCCM/Intune deployment history); (3) Monitoring alerts generated during response (to validate detection rules); (4) Communication trail (notifications sent, approvals, deferral justifications); (5) List of endpoints that were unpatched at time of OOB release (for gap analysis).
Recovery Guidance
After patching and interim controls are lifted: (1) Disable enhanced RRAS logging and monitoring (reduce resource overhead post-recovery). (2) Review post-incident monitoring data (at 2-week mark) for any missed exploitation indicators; if found, escalate to forensics team for root-cause analysis. (3) Update incident response runbooks with lessons learned from this OOB deployment, including communication checklist and patch validation procedures.
Key Forensic Artifacts
Windows Security Event Log (Event ID 4688, 4624, 5156) — process creation, logon events, firewall allow rules
Routing and Remote Access Operational Event Log (Event IDs 20225, 20226, 20219, 20258) — RAS connection attempts, service state changes
Windows Update log (C:\Windows\Logs\WindowsUpdate\WindowsUpdate.log) — hotpatch deployment timestamps and status
Sysmon operational event log (Event ID 1, 3, 10, 11) — process creation with parent-child relationships, network connections, registry modifications
Firewall audit logs (netsh advfirewall show rule name=all, Event ID 5156/5157 in Security log) — inbound connection attempts to RRAS ports (443, 1194, 500, 4500)
RAS connection history (rasphone /showstatus output, C:\Windows\System32\LogFiles\RRAS\) — authentication attempts and active sessions
Network traffic capture (.etl or .pcap) on RRAS-hosting segments — identify unexpected inbound connections or command-and-control traffic post-exploitation
Process memory dumps of svchost.exe instances hosting rasman service — volatile indicators of exploitation (injected shellcode, unusual DLL loads)
Detection Guidance
No IOCs or confirmed exploitation indicators are available in current sources. Detection should focus on behavioral and telemetry signals.
Confirm patch status: query Windows Update logs (%SystemRoot%\SoftwareDistribution\ReportingEvents.log) or use 'Get-HotFix -Id KB5084597' via PowerShell across enrolled endpoints. Monitor Windows Event Log for RRAS-related anomalies: Event IDs 20227, 20228 (RAS connection failures), and unusual entries under the RemoteAccess source in the System log. Watch for unexpected process creation under svchost.exe instances hosting RasMan or RemoteAccess services, particularly spawning cmd.exe, powershell.exe, or network utility processes. Review network logs for unexpected inbound connections to TCP/UDP ports associated with RRAS (e.g., TCP 1723 for PPTP, UDP 500/4500 for IKEv2, TCP/UDP 1701 for L2TP). Once the CVE identifier is published by MSRC with accompanying CVSS vector and threat intelligence, cross-reference against emerging exploitation activity and update detection rules accordingly. **Source Quality Note:** This item is sourced from tier T3 (secondary reporting) only. Detection posture and priority scoring should be updated when MSRC publishes the canonical advisory with CVE ID, CVSS vector, and vendor-confirmed details.
Platform Playbooks
Microsoft Sentinel / Defender
CrowdStrike Falcon
AWS Security
🔒
Microsoft 365 E3
3 log sources
Basic identity + audit. No endpoint advanced hunting. Defender for Endpoint requires separate P1/P2 license.
🛡
Microsoft 365 E5
18 log sources
Full Defender suite: Endpoint P2, Identity, Office 365 P2, Cloud App Security. Advanced hunting across all workloads.
🔍
E5 + Sentinel
27 log sources
All E5 tables + SIEM data (CEF, Syslog, Windows Security Events, Threat Intelligence). Analytics rules, playbooks, workbooks.
Hard indicator (direct match)
Contextual (behavioral query)
Shared platform (review required)
No IOCs or MITRE techniques available for query generation.
No actionable IOCs for CrowdStrike import (benign/contextual indicators excluded).
No hard IOCs available for AWS detection queries (contextual/benign indicators excluded).
Compliance Framework Mappings
AC-6
SC-7
SI-2
AC-17
AC-20
IA-2
+4
MITRE ATT&CK Mapping
T1572
Protocol Tunneling
command-and-control
T1210
Exploitation of Remote Services
lateral-movement
T1133
External Remote Services
persistence
Guidance Disclaimer
The analysis, framework mappings, and incident response recommendations in this intelligence
item are derived from established industry standards including NIST SP 800-61, NIST SP 800-53,
CIS Controls v8, MITRE ATT&CK, and other recognized frameworks. This content is provided
as supplemental intelligence guidance only and does not constitute professional incident response
services. Organizations should adapt all recommendations to their specific environment, risk
tolerance, and regulatory requirements. This material is not a substitute for your organization's
official incident response plan, legal counsel, or qualified security practitioners.
View All Intelligence →