MSRC_CVE-2026-40370

Vulnerability from csaf_microsoft - Published: 2026-05-12 07:00 - Updated: 2026-05-12 07:00
Summary
SQL Server Remote Code Execution Vulnerability
Severity
Important
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Customer Action: Required. The vulnerability documented by this CVE requires customer action to resolve.
CWE-73 - External Control of File Name or Path
Affected products
Product Identifier Version Remediation
Microsoft SQL Server 2017 for x64-based Systems (GDR) 14.0.2110.2
Microsoft SQL Server 2017 for x64-based Systems (GDR)
14.0.2110.2
Microsoft SQL Server 2019 for x64-based Systems (GDR) 15.0.2170.1
Microsoft SQL Server 2019 for x64-based Systems (GDR)
15.0.2170.1
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) 13.0.6490.1
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR)
13.0.6490.1
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack 13.0.7085.1
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack
13.0.7085.1
Microsoft SQL Server 2017 for x64-based Systems (CU 31) 14.0.3530.2
Microsoft SQL Server 2017 for x64-based Systems (CU 31)
14.0.3530.2
Microsoft SQL Server 2022 for x64-based Systems (GDR) 16.0.1180.1
Microsoft SQL Server 2022 for x64-based Systems (GDR)
16.0.1180.1
Microsoft SQL Server 2019 for x64-based Systems (CU 32) 15.0.4470.1
Microsoft SQL Server 2019 for x64-based Systems (CU 32)
15.0.4470.1
Microsoft SQL Server 2025 for x64-based Systems (GDR) 17.0.1115.1
Microsoft SQL Server 2025 for x64-based Systems (GDR)
17.0.1115.1
Microsoft SQL Server 2022 for x64-based Systems (CU 24) 16.0.4252.3
Microsoft SQL Server 2022 for x64-based Systems (CU 24)
16.0.4252.3
Microsoft SQL Server 2025 for x64-based Systems (CU4) 17.0.4040.1
Microsoft SQL Server 2025 for x64-based Systems (CU4)
17.0.4040.1
Product Identifier Version Remediation
Microsoft SQL Server 2025 for x64-based Systems (CU4) <17.0.4040.1
Microsoft SQL Server 2025 for x64-based Systems (CU4)
<17.0.4040.1
Vendor Fix fix
Microsoft SQL Server 2022 for x64-based Systems (CU 24) <16.0.4252.3
Microsoft SQL Server 2022 for x64-based Systems (CU 24)
<16.0.4252.3
Vendor Fix fix
Microsoft SQL Server 2025 for x64-based Systems (GDR) <17.0.1115.1
Microsoft SQL Server 2025 for x64-based Systems (GDR)
<17.0.1115.1
Vendor Fix fix
Microsoft SQL Server 2019 for x64-based Systems (CU 32) <15.0.4470.1
Microsoft SQL Server 2019 for x64-based Systems (CU 32)
<15.0.4470.1
Vendor Fix fix
Microsoft SQL Server 2022 for x64-based Systems (GDR) <16.0.1180.1
Microsoft SQL Server 2022 for x64-based Systems (GDR)
<16.0.1180.1
Vendor Fix fix
Microsoft SQL Server 2017 for x64-based Systems (CU 31) <14.0.3530.2
Microsoft SQL Server 2017 for x64-based Systems (CU 31)
<14.0.3530.2
Vendor Fix fix
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack <13.0.7085.1
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack
<13.0.7085.1
Vendor Fix fix
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) <13.0.6490.1
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR)
<13.0.6490.1
Vendor Fix fix
Microsoft SQL Server 2019 for x64-based Systems (GDR) <15.0.2170.1
Microsoft SQL Server 2019 for x64-based Systems (GDR)
<15.0.2170.1
Vendor Fix fix
Microsoft SQL Server 2017 for x64-based Systems (GDR) <14.0.2110.2
Microsoft SQL Server 2017 for x64-based Systems (GDR)
<14.0.2110.2
Vendor Fix fix
Threats
Impact Remote Code Execution
Exploit Status Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely
Acknowledgments
<a href="https://twitter.com/chudypb">Piotr Bazydło (@chudypb)</a>

{
  "document": {
    "acknowledgments": [
      {
        "names": [
          "\u003ca href=\"https://twitter.com/chudypb\"\u003ePiotr Bazyd\u0142o (@chudypb)\u003c/a\u003e"
        ]
      }
    ],
    "aggregate_severity": {
      "namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      },
      {
        "category": "general",
        "text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
        "title": "Customer Action"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2026-40370 SQL Server Remote Code Execution Vulnerability - HTML",
        "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40370"
      },
      {
        "category": "self",
        "summary": "CVE-2026-40370 SQL Server Remote Code Execution Vulnerability - CSAF",
        "url": "https://msrc.microsoft.com/csaf/advisories/2026/msrc_cve-2026-40370.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Exploitability Index",
        "url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "SQL Server Remote Code Execution Vulnerability",
    "tracking": {
      "current_release_date": "2026-05-12T07:00:00.000Z",
      "generator": {
        "date": "2026-05-12T17:53:09.114Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2026-40370",
      "initial_release_date": "2026-05-12T07:00:00.000Z",
      "revision_history": [
        {
          "date": "2026-05-12T07:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c17.0.4040.1",
            "product": {
              "name": "Microsoft SQL Server 2025 for x64-based Systems (CU4) \u003c17.0.4040.1",
              "product_id": "1"
            }
          },
          {
            "category": "product_version",
            "name": "17.0.4040.1",
            "product": {
              "name": "Microsoft SQL Server 2025 for x64-based Systems (CU4) 17.0.4040.1",
              "product_id": "21289"
            }
          }
        ],
        "category": "product_name",
        "name": "Microsoft SQL Server 2025 for x64-based Systems (CU4)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c16.0.4252.3",
            "product": {
              "name": "Microsoft SQL Server 2022 for x64-based Systems (CU 24) \u003c16.0.4252.3",
              "product_id": "2"
            }
          },
          {
            "category": "product_version",
            "name": "16.0.4252.3",
            "product": {
              "name": "Microsoft SQL Server 2022 for x64-based Systems (CU 24) 16.0.4252.3",
              "product_id": "21091"
            }
          }
        ],
        "category": "product_name",
        "name": "Microsoft SQL Server 2022 for x64-based Systems (CU 24)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c14.0.2110.2",
            "product": {
              "name": "Microsoft SQL Server 2017 for x64-based Systems (GDR) \u003c14.0.2110.2",
              "product_id": "10"
            }
          },
          {
            "category": "product_version",
            "name": "14.0.2110.2",
            "product": {
              "name": "Microsoft SQL Server 2017 for x64-based Systems (GDR) 14.0.2110.2",
              "product_id": "11478"
            }
          }
        ],
        "category": "product_name",
        "name": "Microsoft SQL Server 2017 for x64-based Systems (GDR)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c15.0.2170.1",
            "product": {
              "name": "Microsoft SQL Server 2019 for x64-based Systems (GDR) \u003c15.0.2170.1",
              "product_id": "9"
            }
          },
          {
            "category": "product_version",
            "name": "15.0.2170.1",
            "product": {
              "name": "Microsoft SQL Server 2019 for x64-based Systems (GDR) 15.0.2170.1",
              "product_id": "11821"
            }
          }
        ],
        "category": "product_name",
        "name": "Microsoft SQL Server 2019 for x64-based Systems (GDR)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c13.0.6490.1",
            "product": {
              "name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) \u003c13.0.6490.1",
              "product_id": "8"
            }
          },
          {
            "category": "product_version",
            "name": "13.0.6490.1",
            "product": {
              "name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) 13.0.6490.1",
              "product_id": "12048"
            }
          }
        ],
        "category": "product_name",
        "name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c13.0.7085.1",
            "product": {
              "name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack \u003c13.0.7085.1",
              "product_id": "7"
            }
          },
          {
            "category": "product_version",
            "name": "13.0.7085.1",
            "product": {
              "name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack 13.0.7085.1",
              "product_id": "12053"
            }
          }
        ],
        "category": "product_name",
        "name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c14.0.3530.2",
            "product": {
              "name": "Microsoft SQL Server 2017 for x64-based Systems (CU 31) \u003c14.0.3530.2",
              "product_id": "6"
            }
          },
          {
            "category": "product_version",
            "name": "14.0.3530.2",
            "product": {
              "name": "Microsoft SQL Server 2017 for x64-based Systems (CU 31) 14.0.3530.2",
              "product_id": "12145"
            }
          }
        ],
        "category": "product_name",
        "name": "Microsoft SQL Server 2017 for x64-based Systems (CU 31)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c16.0.1180.1",
            "product": {
              "name": "Microsoft SQL Server 2022 for x64-based Systems (GDR) \u003c16.0.1180.1",
              "product_id": "5"
            }
          },
          {
            "category": "product_version",
            "name": "16.0.1180.1",
            "product": {
              "name": "Microsoft SQL Server 2022 for x64-based Systems (GDR) 16.0.1180.1",
              "product_id": "12147"
            }
          }
        ],
        "category": "product_name",
        "name": "Microsoft SQL Server 2022 for x64-based Systems (GDR)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c17.0.1115.1",
            "product": {
              "name": "Microsoft SQL Server 2025 for x64-based Systems (GDR) \u003c17.0.1115.1",
              "product_id": "3"
            }
          },
          {
            "category": "product_version",
            "name": "17.0.1115.1",
            "product": {
              "name": "Microsoft SQL Server 2025 for x64-based Systems (GDR) 17.0.1115.1",
              "product_id": "20748"
            }
          }
        ],
        "category": "product_name",
        "name": "Microsoft SQL Server 2025 for x64-based Systems (GDR)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c15.0.4470.1",
            "product": {
              "name": "Microsoft SQL Server 2019 for x64-based Systems (CU 32) \u003c15.0.4470.1",
              "product_id": "4"
            }
          },
          {
            "category": "product_version",
            "name": "15.0.4470.1",
            "product": {
              "name": "Microsoft SQL Server 2019 for x64-based Systems (CU 32) 15.0.4470.1",
              "product_id": "16785"
            }
          }
        ],
        "category": "product_name",
        "name": "Microsoft SQL Server 2019 for x64-based Systems (CU 32)"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-40370",
      "cwe": {
        "id": "CWE-73",
        "name": "External Control of File Name or Path"
      },
      "notes": [
        {
          "category": "general",
          "text": "Microsoft",
          "title": "Assigning CNA"
        },
        {
          "category": "faq",
          "text": "An authenticated attacker with explicit permissions could exploit the vulnerability by logging in to the SQL server and could then elevate their privileges to sysadmin.",
          "title": "How could an attacker exploit this vulnerability?"
        },
        {
          "category": "faq",
          "text": "The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution. As an authenticated user, the attacker could attempt to trigger malicious code in the context of the server\u0027s account through a network call.\nThe privilege requirement is low because the attacker needs to be authenticated as a normal user.",
          "title": "According to the CVSS metric, the attack vector is network (AV:N), and privilege required is low (PR:L). What is the target used in the context of the remote code execution?"
        },
        {
          "category": "faq",
          "text": "Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.\nFirst, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components., Second, in the following table, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.\n5089899: 5089899, Security update for SQL Server 2025 CU4+GDR: Security update for SQL Server 2025 CU4+GDR, 17.0.4040.1: 17.0.4040.1, 17.0.4006.2 - 17.0.4035.5: 17.0.4006.2 - 17.0.4035.5, KB5081495 -\u00a0Previous SQL2025 RTM CU4: KB5081495 -\u00a0Previous SQL2025 RTM CU4, 5091223: 5091223, Security update for SQL Server 2025 RTM+GDR: Security update for SQL Server 2025 RTM+GDR, 17.0.1115.1: 17.0.1115.1, 17.0.1000.7 - 17.0.1110.1: 17.0.1000.7 - 17.0.1110.1, KB5084814 - Previous SQL2025 RTM GDR: KB5084814 - Previous SQL2025 RTM GDR, 5089900: 5089900, Security update for SQL Server 2022 CU24+GDR: Security update for SQL Server 2022 CU24+GDR, 16.0.4252.3: 16.0.4252.3, 16.0.4003.1 -\u00a016.0.4250.1: 16.0.4003.1 -\u00a016.0.4250.1, KB5083252 - Previous SQL2022 RTM CU24: KB5083252 - Previous SQL2022 RTM CU24, 5091158: 5091158, Security update for SQL Server 2022 RTM+GDR: Security update for SQL Server 2022 RTM+GDR, 16.0.1180.1: 16.0.1180.1, 16.0.1000.6 -\u00a016.0.1175.1: 16.0.1000.6 -\u00a016.0.1175.1, KB5084815 - Previous SQL2022 RTM GDR: KB5084815 - Previous SQL2022 RTM GDR, 5090407: 5090407, Security update for SQL Server 2019 CU32+GDR: Security update for SQL Server 2019 CU32+GDR, 15.0.4470.1: 15.0.4470.1, 15.0.4003.23 - 15.0.4465.1: 15.0.4003.23 - 15.0.4465.1, KB 5084816 - Previous SQL2019 RTM CU32 GDR: KB 5084816 - Previous SQL2019 RTM CU32 GDR, 5090408: 5090408, Security update for SQL Server 2019 RTM+GDR: Security update for SQL Server 2019 RTM+GDR, 15.0.2170.1: 15.0.2170.1, 15.0.2000.5 - 15.0.2165.1: 15.0.2000.5 - 15.0.2165.1, KB 5084817 - Previous SQL2019 RTM GDR: KB 5084817 - Previous SQL2019 RTM GDR, 5090354: 5090354, Security update for SQL Server 2017 CU31+GDR: Security update for SQL Server 2017 CU31+GDR, 14.0.3530.2: 14.0.3530.2, 14.0.3006.16 - 14.0.3525.1: 14.0.3006.16 - 14.0.3525.1, KB 5084818  - Previous SQL2017 RTM CU31 GDR: KB 5084818  - Previous SQL2017 RTM CU31 GDR, 5090347: 5090347, Security update for SQL Server 2017 RTM+GDR: Security update for SQL Server 2017 RTM+GDR, 14.0.2110.2: 14.0.2110.2, 14.0.1000.169 - 14.0.2105.1: 14.0.1000.169 - 14.0.2105.1, KB 5084819 - Previous SQL2017 RTM GDR: KB 5084819 - Previous SQL2017 RTM GDR, 5089270: 5089270, Security update for SQL Server 2016 Azure Connect Feature Pack+GDR: Security update for SQL Server 2016 Azure Connect Feature Pack+GDR, 13.0.7085.1: 13.0.7085.1, 13.0.7000.253 - 13.0.7080.1: 13.0.7000.253 - 13.0.7080.1, KB 5084820 - Previous SQL2016 Azure Connect Feature Pack\u00a0GDR: KB 5084820 - Previous SQL2016 Azure Connect Feature Pack\u00a0GDR, 5089271: 5089271, Security update for SQL Server 2016 SP3+GDR: Security update for SQL Server 2016 SP3+GDR, 13.0.6490.1: 13.0.6490.1, 13.0.6300.2 - 13.0.6485.1: 13.0.6300.2 - 13.0.6485.1, KB 5084821 - Previous SQL2016 RTM GDR: KB 5084821 - Previous SQL2016 RTM GDR\nThe General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.\nGDR updates \u2013 cumulatively only contain security updates for the given baseline., CU updates \u2013 cumulatively contain all functional fixes and security updates for the given baseline.\nFor any given baseline, either the GDR or CU updates could be options (see below).\nIf SQL Server installation is at a baseline version, you can choose either the GDR or CU update., If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package., If SQL Server installation has intentionally installed previous CU updates, then choose to install the CU security update package.\nYes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.",
          "title": "I am running SQL Server on my system. What action do I need to take?"
        }
      ],
      "product_status": {
        "fixed": [
          "11478",
          "11821",
          "12048",
          "12053",
          "12145",
          "12147",
          "16785",
          "20748",
          "21091",
          "21289"
        ],
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6",
          "7",
          "8",
          "9",
          "10"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-40370 SQL Server Remote Code Execution Vulnerability - HTML",
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40370"
        },
        {
          "category": "self",
          "summary": "CVE-2026-40370 SQL Server Remote Code Execution Vulnerability - CSAF",
          "url": "https://msrc.microsoft.com/csaf/advisories/2026/msrc_cve-2026-40370.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-12T07:00:00.000Z",
          "details": "17.0.4040.1:Security Update:https://support.microsoft.com/help/5089899",
          "product_ids": [
            "1"
          ],
          "url": "https://support.microsoft.com/help/5089899"
        },
        {
          "category": "vendor_fix",
          "date": "2026-05-12T07:00:00.000Z",
          "details": "16.0.4252.3:Security Update:https://support.microsoft.com/help/5089900",
          "product_ids": [
            "2"
          ],
          "url": "https://support.microsoft.com/help/5089900"
        },
        {
          "category": "vendor_fix",
          "date": "2026-05-12T07:00:00.000Z",
          "details": "14.0.2110.2:Security Update:https://support.microsoft.com/help/5090347",
          "product_ids": [
            "10"
          ],
          "url": "https://support.microsoft.com/help/5090347"
        },
        {
          "category": "vendor_fix",
          "date": "2026-05-12T07:00:00.000Z",
          "details": "15.0.2170.1:Security Update:https://support.microsoft.com/help/5090408",
          "product_ids": [
            "9"
          ],
          "url": "https://support.microsoft.com/help/5090408"
        },
        {
          "category": "vendor_fix",
          "date": "2026-05-12T07:00:00.000Z",
          "details": "13.0.6490.1:Security Update:https://support.microsoft.com/help/5089271",
          "product_ids": [
            "8"
          ],
          "url": "https://support.microsoft.com/help/5089271"
        },
        {
          "category": "vendor_fix",
          "date": "2026-05-12T07:00:00.000Z",
          "details": "13.0.7085.1:Security Update:https://support.microsoft.com/help/5089270",
          "product_ids": [
            "7"
          ],
          "url": "https://support.microsoft.com/help/5089270"
        },
        {
          "category": "vendor_fix",
          "date": "2026-05-12T07:00:00.000Z",
          "details": "14.0.3530.2:Security Update:https://support.microsoft.com/help/5090354",
          "product_ids": [
            "6"
          ],
          "url": "https://support.microsoft.com/help/5090354"
        },
        {
          "category": "vendor_fix",
          "date": "2026-05-12T07:00:00.000Z",
          "details": "16.0.1180.1:Security Update:https://support.microsoft.com/help/5091158",
          "product_ids": [
            "5"
          ],
          "url": "https://support.microsoft.com/help/5091158"
        },
        {
          "category": "vendor_fix",
          "date": "2026-05-12T07:00:00.000Z",
          "details": "17.0.1115.1:Security Update:https://support.microsoft.com/help/5091223",
          "product_ids": [
            "3"
          ],
          "url": "https://support.microsoft.com/help/5091223"
        },
        {
          "category": "vendor_fix",
          "date": "2026-05-12T07:00:00.000Z",
          "details": "15.0.4470.1:Security Update:https://support.microsoft.com/help/5090407",
          "product_ids": [
            "4"
          ],
          "url": "https://support.microsoft.com/help/5090407"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalsScore": 0.0,
            "exploitCodeMaturity": "UNPROVEN",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "remediationLevel": "OFFICIAL_FIX",
            "reportConfidence": "CONFIRMED",
            "scope": "UNCHANGED",
            "temporalScore": 7.7,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6",
            "7",
            "8",
            "9",
            "10"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Remote Code Execution"
        },
        {
          "category": "exploit_status",
          "details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely"
        }
      ],
      "title": "SQL Server Remote Code Execution Vulnerability"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…