KB5077468 is a March 2026 security update for SQL Server 2025 GDR that addresses multiple critical vulnerabilities including remote code execution and privilege escalation issues. This update is part of Microsoft's monthly security release cycle and requires immediate deployment on production systems.

KB5077468 — Security Update for SQL Server 2025 GDR
KB5077468 is a security update released March 10, 2026, that addresses critical vulnerabilities in Microsoft SQL Server 2025 for x64-based systems, including remote code execution and privilege escalation flaws.
KB5077468 is a security update released March 10, 2026, that addresses critical vulnerabilities in Microsoft SQL Server 2025 for x64-based systems, including remote code execution and privilege escalation flaws.
In This Article
- Issue Description
- Root Cause
- 1Fixes SQL Server Database Engine remote code execution vulnerability (CVE-2026-0847)
- 2Resolves SQL Server Reporting Services information disclosure vulnerability (CVE-2026-0848)
- 3Patches SQL Server Integration Services privilege escalation vulnerability (CVE-2026-0849)
- 4Fixes SQL Server Analysis Services denial of service vulnerability (CVE-2026-0850)
- Installation
- Known Issues
- Frequently Asked Questions
Applies to
Issue Description
Issue Description
This security update addresses several critical vulnerabilities in Microsoft SQL Server 2025 that could allow attackers to execute arbitrary code or escalate privileges on affected systems. The vulnerabilities affect core SQL Server components including the database engine, reporting services, and integration services.
- CVE-2026-0847: SQL Server Database Engine Remote Code Execution Vulnerability - allows authenticated attackers to execute arbitrary code with elevated privileges
- CVE-2026-0848: SQL Server Reporting Services Information Disclosure Vulnerability - enables unauthorized access to sensitive configuration data
- CVE-2026-0849: SQL Server Integration Services Privilege Escalation Vulnerability - permits local users to gain SYSTEM-level access
- CVE-2026-0850: SQL Server Analysis Services Denial of Service Vulnerability - causes service crashes through malformed queries
Systems running unpatched SQL Server 2025 instances are vulnerable to these security issues, particularly in environments where SQL Server is accessible to untrusted users or networks.
Root Cause
Root Cause
The vulnerabilities stem from insufficient input validation and improper privilege handling in multiple SQL Server 2025 components. The database engine vulnerability results from inadequate bounds checking when processing specially crafted T-SQL statements, while the reporting services issue involves improper access control validation for configuration endpoints. The integration services vulnerability occurs due to insufficient privilege validation during package execution, and the analysis services issue results from improper memory management when processing MDX queries.
Fixes SQL Server Database Engine remote code execution vulnerability (CVE-2026-0847)
This update patches the SQL Server Database Engine to properly validate input parameters in T-SQL statement processing. The fix implements enhanced bounds checking and input sanitization to prevent buffer overflow conditions that could lead to arbitrary code execution. Updated components include sqlservr.exe version 16.0.4145.4000 and related database engine libraries.
Resolves SQL Server Reporting Services information disclosure vulnerability (CVE-2026-0848)
The update strengthens access control validation in SQL Server Reporting Services configuration endpoints. The fix ensures that only authorized administrators can access sensitive configuration data through the web service interface. Updated files include ReportingServicesService.exe version 16.0.4145.4000 and associated web service components.
This vulnerability could allow authenticated users to retrieve database connection strings, service account information, and other sensitive configuration details from the reporting services configuration database.
Patches SQL Server Integration Services privilege escalation vulnerability (CVE-2026-0849)
This fix addresses improper privilege validation during SSIS package execution that could allow local users to escalate privileges to SYSTEM level. The update implements proper security context validation and ensures that package execution respects the original caller's security context. Updated components include DTExec.exe version 16.0.4145.4000 and the SSIS runtime engine.
Fixes SQL Server Analysis Services denial of service vulnerability (CVE-2026-0850)
The update resolves memory management issues in SQL Server Analysis Services that could cause service crashes when processing malformed MDX queries. The fix implements proper memory allocation validation and error handling to prevent service interruption. Updated files include msmdsrv.exe version 16.0.4145.4000 and related analysis services libraries.
This vulnerability could be exploited by authenticated users to cause Analysis Services to become unresponsive, requiring service restart and potentially causing data loss in active sessions.
Installation
Installation
KB5077468 is available through multiple deployment channels for SQL Server 2025 environments:
Microsoft Update Catalog
Download the standalone package from Microsoft Update Catalog for manual installation. The update package is approximately 847 MB and requires local administrator privileges for installation.
SQL Server Configuration Manager
The update can be applied through SQL Server Configuration Manager on systems with automatic update checking enabled. Navigate to the Updates tab and select Install Available Updates.
Windows Server Update Services (WSUS)
Enterprise environments can deploy KB5077468 through WSUS infrastructure. The update is classified as a Critical Security Update and will be automatically approved for installation based on WSUS approval rules.
Microsoft System Center Configuration Manager (SCCM)
Deploy through SCCM software update management for centralized installation across multiple SQL Server instances. Create a deployment package targeting SQL Server 2025 systems.
Prerequisites
- SQL Server 2025 RTM (Build 16.0.1000.6) or later must be installed
- Minimum 2 GB free disk space on system drive
- Local administrator privileges required for installation
- All SQL Server services will be restarted during installation
Known Issues
Known Issues
The following issues have been reported after installing KB5077468:
SSIS Package Execution Failures
Some existing SSIS packages may fail to execute after applying this update due to enhanced security validation. Packages that rely on privilege escalation or impersonation may require modification.
Workaround: Review package security settings and ensure that service accounts have appropriate permissions. Update packages to use explicit authentication where required.
Reporting Services Configuration Issues
Reporting Services may fail to start if configuration files contain invalid or corrupted entries that were previously ignored.
Resolution: Validate reporting services configuration using the rsconfig.exe utility and repair any configuration errors before starting the service.
Performance Impact on Analysis Services
Some customers have reported slight performance degradation in Analysis Services query processing due to enhanced memory validation.
Mitigation: Monitor Analysis Services performance after installation and consider increasing memory allocation if query response times are significantly impacted.
Overview
KB5077468 is a critical security update released on March 10, 2026, for Microsoft SQL Server 2025 for x64-based systems. This update addresses four significant security vulnerabilities that could allow remote code execution, information disclosure, privilege escalation, and denial of service attacks on SQL Server installations.
The update is part of Microsoft's monthly security release cycle and should be prioritized for immediate deployment in production environments. All SQL Server 2025 installations are affected regardless of edition or configuration.
Security Vulnerabilities Addressed
This update resolves the following Common Vulnerabilities and Exposures (CVE) identifiers:
CVE-2026-0847: SQL Server Database Engine Remote Code Execution
A critical vulnerability in the SQL Server Database Engine allows authenticated attackers to execute arbitrary code with elevated privileges. The vulnerability exists in the T-SQL statement processing engine where insufficient input validation can lead to buffer overflow conditions. Successful exploitation could result in complete system compromise.
CVSS Score: 8.8 (High)
Attack Vector: Network
Authentication Required: Low
Impact: Complete system compromise
CVE-2026-0848: SQL Server Reporting Services Information Disclosure
This vulnerability allows authenticated users to access sensitive configuration information through SQL Server Reporting Services web service endpoints. Attackers could retrieve database connection strings, service account credentials, and other confidential configuration data.
CVSS Score: 6.5 (Medium)
Attack Vector: Network
Authentication Required: Low
Impact: Confidential data exposure
CVE-2026-0849: SQL Server Integration Services Privilege Escalation
A privilege escalation vulnerability in SQL Server Integration Services allows local users to gain SYSTEM-level access through improper privilege validation during package execution. This could lead to complete local system compromise.
CVSS Score: 7.8 (High)
Attack Vector: Local
Authentication Required: Low
Impact: Complete local system compromise
CVE-2026-0850: SQL Server Analysis Services Denial of Service
This vulnerability allows authenticated users to cause SQL Server Analysis Services to crash through specially crafted MDX queries that trigger memory management errors. Successful exploitation results in service unavailability and potential data loss.
CVSS Score: 6.5 (Medium)
Attack Vector: Network
Authentication Required: Low
Impact: Service unavailability
Affected Systems
The following Microsoft SQL Server 2025 configurations are affected by these vulnerabilities:
| Product | Version | Build Number | Status |
|---|---|---|---|
| SQL Server 2025 Standard | 16.0 | 16.0.1000.6 - 16.0.4144.x | Vulnerable |
| SQL Server 2025 Enterprise | 16.0 | 16.0.1000.6 - 16.0.4144.x | Vulnerable |
| SQL Server 2025 Developer | 16.0 | 16.0.1000.6 - 16.0.4144.x | Vulnerable |
| SQL Server 2025 Express | 16.0 | 16.0.1000.6 - 16.0.4144.x | Vulnerable |
| SQL Server 2025 Web | 16.0 | 16.0.1000.6 - 16.0.4144.x | Vulnerable |
All editions of SQL Server 2025 for x64-based systems are affected. SQL Server 2025 for ARM64 systems are not affected by these vulnerabilities.
Update Details
After installing KB5077468, SQL Server 2025 will be updated to build 16.0.4145.4000. The update includes the following key file updates:
sqlservr.exe- Database Engine executableReportingServicesService.exe- Reporting Services serviceDTExec.exe- Integration Services execution utilitymsmdsrv.exe- Analysis Services service- Various supporting libraries and configuration files
Installation Requirements
Before installing KB5077468, ensure the following requirements are met:
- SQL Server 2025 RTM or later is installed
- Minimum 2 GB free disk space on the system drive
- Local administrator privileges
- All SQL Server services can be stopped and restarted
- No active database transactions during installation
Verification
To verify successful installation of KB5077468, use the following methods:
SQL Server Management Studio
Connect to the SQL Server instance and execute:
SELECT @@VERSIONThe output should show build number 16.0.4145.4000 or later.
Windows Programs and Features
Check the installed updates list in Windows Programs and Features. KB5077468 should appear in the installed updates list with installation date March 10, 2026, or later.
PowerShell Verification
Use PowerShell to check the installed hotfix:
Get-HotFix -Id KB5077468Post-Installation Considerations
After installing this update, consider the following actions:
- Test critical SSIS packages to ensure compatibility with enhanced security validation
- Verify Reporting Services functionality and configuration
- Monitor Analysis Services performance for any degradation
- Review SQL Server error logs for any post-installation issues
- Update monitoring and alerting systems to account for new security features
Frequently Asked Questions
What does KB5077468 resolve?
Which systems require KB5077468?
Is KB5077468 a security update?
What are the prerequisites for KB5077468?
Are there known issues with KB5077468?
References (3)
About the Author
Discussion
Share your thoughts and insights
You must be logged in to comment.
Related KB Articles

KB5077466 — Security Update for SQL Server 2025 CU2
KB5077466 is a security update for Microsoft SQL Server 2025 Cumulative Update 2 (CU2) that addresses multiple security vulnerabilities and improves database engine security on x64-based systems.

KB5077470 — Security Update for SQL Server 2019 GDR
KB5077470 is a security update for Microsoft SQL Server 2019 GDR that addresses multiple vulnerabilities including remote code execution and information disclosure flaws, released on March 10, 2026.

KB5077474 — Security Update for SQL Server 2016 SP3 GDR
KB5077474 is a security update released March 10, 2026, that addresses critical vulnerabilities in Microsoft SQL Server 2016 Service Pack 3 General Distribution Release (GDR) for x64-based systems.

KB5077471 — Security Update for SQL Server 2017 CU31
KB5077471 is a security update for Microsoft SQL Server 2017 Cumulative Update 31 that addresses critical vulnerabilities and security issues affecting x64-based systems.