“`html

Microsoft has revealed a significant zero-day vulnerability in SQL Server that permits authenticated perpetrators to elevate their privileges to the utmost administrative tier on affected database systems.

Identified as CVE-2026-21262, the issue was officially shared on March 10, 2026, and has been publicly revealed, sparking urgent alarms for organizations employing SQL Server in enterprise settings.

The vulnerability arises from inadequate access regulation (CWE-284) within Microsoft SQL Server, allowing an authorized intruder to enhance privileges through a network.

As per Microsoft’s advisory, a malicious actor who effectively exploits this vulnerability could acquire SQL sysadmin privileges, the highest level of access within a SQL Server setting, thereby gaining absolute control over the database instance.

The flaw bears a CVSS v3.1 base score of 8.8, categorized as Important severity. The attack vector is network-oriented with low complexity, requiring merely low-level permissions to initiate, and necessitating no user involvement.

The ramifications cover all three fundamental security dimensions: confidentiality, integrity, and availability, all rated High, rendering this vulnerability exceptionally perilous in data-sensitive environments.


google

Microsoft SQL Server Zero-Day Vulnerability

Microsoft confirmed that the vulnerability has been publicly acknowledged but has not yet been actively manipulated in real-world scenarios, with exploitability rated as “Exploitation Less Likely.” Nevertheless, the public acknowledgment considerably reduces the barrier for threat actors to create functioning exploits.

An authenticated intruder with explicit permissions can exploit the vulnerability by logging into the SQL Server instance and using the improper access control issue to elevate their session to the sysadmin tier.

This kind of privilege escalation attack is particularly hazardous in multi-tenant or shared database environments, where low-privileged users may already have legitimate access.

Microsoft has issued security updates covering SQL Server 2016 through the latest SQL Server 2025. Administrators should ascertain their current version and apply the pertinent GDR or Cumulative Update (CU) patch accordingly. Significant updates include:

  • SQL Server 2025: KB updates 5077466 (CU2+GDR) and 5077468 (RTM+GDR)
  • SQL Server 2022: KB updates 5077464 (CU23+GDR) and 5077465 (RTM+GDR)
  • SQL Server 2019: KB updates 5077469 (CU32+GDR) and 5077470 (RTM+GDR)
  • SQL Server 2017: KB updates 5077471 and 5077472
  • SQL Server 2016: KB updates 5077473 and 5077474

SQL Server instances hosted on Windows Azure (IaaS) can receive updates via Microsoft Update or through manual download from the Microsoft Download Center.

Security teams should prioritize patching without delay, given the public disclosure status of this vulnerability. Organizations ought to audit SQL Server user permissions, restrict explicit privileges to trusted accounts solely, and monitor for unusual privilege escalation activity within database logs.

Versions no longer backed by Microsoft ought to be upgraded to a supported release to receive this and forthcoming security patches.

“`