KB5084818 is an April 2026 security update for Microsoft SQL Server 2017 Cumulative Update 31. This update addresses multiple security vulnerabilities and improves the overall security posture of SQL Server 2017 installations on x64-based systems.

KB5084818 — Security Update for SQL Server 2017 CU31
KB5084818 is a security update for Microsoft SQL Server 2017 Cumulative Update 31 that addresses critical vulnerabilities and security issues affecting x64-based systems.
PS C:\> Get-HotFix -Id KB5084818# Returns patch details if KB5084818 is installed
Download from Microsoft Update Catalog
Get the official update package directly from Microsoft
Issue Description
Issue Description
This security update addresses several vulnerabilities in Microsoft SQL Server 2017 that could potentially allow unauthorized access or privilege escalation:
- Remote code execution vulnerabilities in SQL Server Database Engine
- Information disclosure vulnerabilities affecting SQL Server services
- Denial of service vulnerabilities that could impact database availability
- Authentication bypass issues in specific SQL Server configurations
- Buffer overflow conditions in SQL Server components
Without this update, SQL Server 2017 installations may be vulnerable to security exploits that could compromise database integrity, confidentiality, or availability.
Root Causes
Root Cause
The vulnerabilities addressed by KB5084818 stem from insufficient input validation in SQL Server Database Engine components, improper memory management in certain SQL Server services, and inadequate authentication checks in specific database operations. These issues exist in the core SQL Server 2017 codebase and affect systems running Cumulative Update 31.
Overview
KB5084818 is a critical security update released on April 14, 2026, for Microsoft SQL Server 2017 Cumulative Update 31. This update addresses multiple high-severity vulnerabilities that could potentially compromise database security, integrity, and availability. The update is specifically designed for x64-based systems running SQL Server 2017 and is essential for maintaining a secure database environment.
Security Vulnerabilities Addressed
This security update resolves several critical vulnerabilities in SQL Server 2017:
Remote Code Execution Vulnerability
The most critical vulnerability addressed by KB5084818 is a remote code execution flaw in the SQL Server Database Engine. This vulnerability could allow an authenticated attacker to execute arbitrary code with elevated privileges on the database server. The vulnerability exists due to insufficient input validation in query processing components and affects all SQL Server 2017 installations.
Information Disclosure Vulnerabilities
Multiple information disclosure vulnerabilities have been identified that could allow unauthorized access to sensitive database metadata, configuration information, and potentially user data. These vulnerabilities stem from inadequate access controls in system catalog queries and could be exploited by low-privileged database users to gain access to restricted information.
Denial of Service Vulnerabilities
The update addresses several denial of service vulnerabilities that could be exploited through specially crafted SQL queries to cause database service interruption or complete system crashes. These vulnerabilities pose significant risks to database availability and business continuity.
Authentication Bypass Issues
Authentication bypass vulnerabilities in specific SQL Server configurations could allow attackers to circumvent normal authentication mechanisms and gain unauthorized access to database resources. These issues are particularly concerning in environments with complex authentication setups or federated identity configurations.
Affected Systems and Compatibility
KB5084818 applies to the following systems:
| Product | Version | Architecture | Status |
|---|---|---|---|
| SQL Server 2017 | CU 31 (Build 14.0.3465.1) | x64 | Affected |
| Windows Server 2016 | All versions | x64 | Supported |
| Windows Server 2019 | All versions | x64 | Supported |
| Windows Server 2022 | All versions | x64 | Supported |
Technical Implementation Details
The security fixes implemented in KB5084818 include:
Enhanced Input Validation
The update implements comprehensive input validation mechanisms throughout the SQL Server Database Engine to prevent injection attacks and buffer overflow conditions. These enhancements include stricter parameter checking, improved data type validation, and enhanced boundary checking for memory operations.
Strengthened Access Controls
Access control mechanisms have been enhanced to prevent unauthorized access to system catalogs and sensitive database metadata. The update implements additional authorization checks and improves privilege validation for database operations.
Improved Memory Management
Memory management components have been updated to address buffer overflow vulnerabilities and improve overall system stability. These changes include enhanced memory allocation procedures, improved garbage collection mechanisms, and stricter memory boundary enforcement.
Authentication Enhancements
Authentication mechanisms have been strengthened to prevent bypass attacks and improve overall security posture. The update includes enhanced credential validation, improved session management, and stricter authentication protocol enforcement.
Installation Requirements and Process
Before installing KB5084818, ensure the following prerequisites are met:
- SQL Server 2017 Cumulative Update 31 is installed and operational
- Administrative privileges are available for the installation account
- Sufficient disk space (minimum 2 GB) is available on the system drive
- A maintenance window is scheduled as SQL Server services will be restarted
- Current database backups are available for recovery purposes
Installation Steps
- Download the update package from Microsoft Update Catalog or configure automatic deployment through WSUS/SCCM
- Verify system prerequisites and available disk space
- Schedule a maintenance window for SQL Server service interruption
- Execute the installation package with administrative privileges
- Monitor the installation process and verify successful completion
- Restart SQL Server services if not automatically restarted
- Verify database functionality and performance after installation
Post-Installation Verification
After installing KB5084818, perform the following verification steps:
Version Verification
Verify the SQL Server version has been updated by executing:
SELECT @@VERSIONThe output should reflect the updated build number incorporating the security fixes.
Service Status Check
Confirm all SQL Server services are running properly:
Get-Service -Name "MSSQL*" | Select-Object Name, StatusDatabase Connectivity Test
Test database connectivity and basic functionality to ensure the update has not introduced any operational issues.
Security Recommendations
In addition to installing KB5084818, consider implementing the following security best practices:
- Regularly review and update SQL Server security configurations
- Implement network segmentation to limit SQL Server exposure
- Enable SQL Server audit logging for security monitoring
- Regularly review and update database user permissions
- Implement database encryption for sensitive data protection
Key Fixes & Changes
Fixes remote code execution vulnerability in SQL Server Database Engine
This update patches a critical remote code execution vulnerability in the SQL Server Database Engine that could allow an authenticated attacker to execute arbitrary code with elevated privileges. The fix implements enhanced input validation and memory boundary checks in database query processing components.
Resolves information disclosure vulnerability in SQL Server services
Addresses an information disclosure vulnerability that could allow unauthorized users to access sensitive database metadata and configuration information. The update strengthens access controls and implements additional authorization checks for system catalog queries.
Patches denial of service vulnerability in query processing
Fixes a denial of service vulnerability that could be exploited through specially crafted SQL queries to cause database service interruption. The update includes improved query validation and resource management to prevent service crashes.
Strengthens authentication mechanisms in SQL Server
Enhances authentication validation processes to prevent authentication bypass attacks in certain SQL Server configurations. The update implements stricter credential verification and session management controls.
Addresses buffer overflow conditions in SQL Server components
Resolves multiple buffer overflow vulnerabilities in SQL Server components that could be exploited for code execution. The fix includes improved memory allocation and bounds checking throughout the SQL Server codebase.
Installation
Installation
KB5084818 is available through multiple distribution channels:
Microsoft Update Catalog
Download the standalone package directly from Microsoft Update Catalog for manual installation on SQL Server 2017 systems. The update package is approximately 850 MB and requires administrative privileges for installation.
Windows Server Update Services (WSUS)
Enterprise environments can deploy this update through WSUS infrastructure. The update will appear in the SQL Server Products classification and requires approval for deployment to target systems.
System Center Configuration Manager (SCCM)
Deploy KB5084818 through SCCM software update management. Create a deployment package targeting systems with SQL Server 2017 CU31 installed.
Prerequisites
- Microsoft SQL Server 2017 Cumulative Update 31 must be installed
- Administrative privileges required for installation
- Minimum 2 GB free disk space on system drive
- SQL Server services will be restarted during installation
Installation Process
The update installation process includes:
- Backup verification of existing SQL Server databases
- Temporary suspension of SQL Server services
- Application of security patches to SQL Server binaries
- Update of system catalogs and metadata
- Restart of SQL Server services
Known Issues
Known Issues
The following issues have been reported after installing KB5084818:
Installation Failures
- Error 0x80070643: Installation may fail if insufficient disk space is available. Ensure at least 2 GB free space on the system drive before installation.
- Error 0x80070005: Access denied errors occur when installation is attempted without administrative privileges. Run the installer as an administrator.
Service Startup Issues
In rare cases, SQL Server services may fail to start after update installation due to configuration conflicts. If this occurs:
- Check SQL Server error logs for specific error messages
- Verify SQL Server service account permissions
- Restart the server if services remain unresponsive
Performance Considerations
Some users may experience temporary performance degradation immediately after installation as SQL Server rebuilds internal caches and optimizes query plans with the updated engine components.
Frequently Asked Questions
What does KB5084818 resolve?+
Which systems require KB5084818?+
Is KB5084818 a security update?+
What are the prerequisites for KB5084818?+
Are there known issues with KB5084818?+
References (3)
Discussion
Share your thoughts and insights
Sign in to join the discussion
Related KB Articles

KB5083245 — Security Update for SQL Server 2025 CU3
KB5083245 is a security update for Microsoft SQL Server 2025 Cumulative Update 3 (CU3) that addresses critical vulnerabilities in the database engine and related components.

KB5084819 — Security Update for SQL Server 2017 GDR
KB5084819 is a security update for Microsoft SQL Server 2017 GDR that addresses critical vulnerabilities in the database engine and improves overall system security for x64-based systems.

KB5084817 — Security Update for SQL Server 2019 GDR
KB5084817 is a security update released April 14, 2026, for Microsoft SQL Server 2019 General Distribution Release (GDR) that addresses critical security vulnerabilities in the database engine and related components.

