CVE-2026-26111

HIGH
2026-03-10 [email protected]
8.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
PoC Detected
Mar 13, 2026 - 20:43 vuln.today
Public exploit code
Analysis Generated
Mar 12, 2026 - 21:55 vuln.today
CVE Published
Mar 10, 2026 - 18:18 nvd
HIGH 8.0

Description

Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

Analysis

Remote code execution in Windows RRAS across Server 2016, 2022, and 2025 via an integer overflow vulnerability allows authenticated attackers to execute arbitrary code over the network with high privileges. Public exploit code exists for this vulnerability, and no patch is currently available. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify and inventory all systems running RRAS; disable RRAS services on non-critical systems and restrict network access to RRAS ports (TCP/UDP 1723, 500, 4500) to trusted networks only. Within 7 days: Implement enhanced monitoring and logging for RRAS traffic; conduct vulnerability scans to identify exposed instances; escalate patch development tracking with Microsoft. …

Sign in for detailed remediation steps.

Priority Score

60
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +40
POC: +20

Share

CVE-2026-26111 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy