Description
Improper validation of specified type of input in SQL Server allows an authorized attacker to elevate privileges over a network.
Published: 2026-03-10
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

The vulnerability is caused by improper validation of a specific type of input in Microsoft SQL Server. As a result, an attacker who already has authorized access to a network can elevate their privileges to a higher level. This represents a classic privilege‑escalation flaw where the attacker could potentially gain administrative rights or perform actions beyond their intended scope. The weakness is identified as CWE‑1287, which describes an authorization bypass through user-controlled keys or validation errors.

Affected Systems

Affected systems include Microsoft SQL Server 2016 Service Pack 3 (GDR and Azure Connect Feature Pack), Microsoft SQL Server 2017 (CU 31 and GDR), Microsoft SQL Server 2019 (CU 32 and GDR), Microsoft SQL Server 2022 (GDR and CU 23 for x64‑based systems), and Microsoft SQL Server 2025 (CU 2 and GDR for x64‑based systems). Specific version details are not provided in the CNA affected version list, but the product names and service pack levels listed above are the affected configurations. The Common Platform Enumeration strings confirm coverage across multiple SQL Server releases on x64 platforms.

Risk and Exploitability

The CVSS score of 8.8 labels this a high‑severity vulnerability, indicating a significant impact if successfully exploited. The EPSS score of less than 1% suggests that exploitation is currently improbable, and the vulnerability is not catalogued in the CISA KEV repository. Attackers would need existing authorized network access to the SQL Server instance and would exploit the faulty input validation to raise their privileges. Because the attack vector requires local or network-level credentials, the exploitation conditions are relatively constrained compared to remote code execution flaws.

Generated by OpenCVE AI on March 16, 2026 at 23:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch or cumulative update for your SQL Server version from the Microsoft Update Center or the update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26115
  • Verify that the update has been installed by checking the server version or release notes
  • If a patch is not yet available, restrict network access to the SQL Server instance and monitor Microsoft security bulletins for an update

Generated by OpenCVE AI on March 16, 2026 at 23:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*

Wed, 11 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft microsoft Sql Server 2016 Service Pack 3 (gdr)
Microsoft microsoft Sql Server 2016 Service Pack 3 Azure Connect Feature Pack
Microsoft microsoft Sql Server 2017 (cu 31)
Microsoft microsoft Sql Server 2017 (gdr)
Microsoft microsoft Sql Server 2019 (cu 32)
Microsoft microsoft Sql Server 2019 (gdr)
Microsoft microsoft Sql Server 2022 (gdr)
Microsoft microsoft Sql Server 2022 For X64-based Systems (cu 23)
Microsoft microsoft Sql Server 2025 (cu 2)
Microsoft microsoft Sql Server 2025 For X64-based Systems (gdr)
Vendors & Products Microsoft microsoft Sql Server 2016 Service Pack 3 (gdr)
Microsoft microsoft Sql Server 2016 Service Pack 3 Azure Connect Feature Pack
Microsoft microsoft Sql Server 2017 (cu 31)
Microsoft microsoft Sql Server 2017 (gdr)
Microsoft microsoft Sql Server 2019 (cu 32)
Microsoft microsoft Sql Server 2019 (gdr)
Microsoft microsoft Sql Server 2022 (gdr)
Microsoft microsoft Sql Server 2022 For X64-based Systems (cu 23)
Microsoft microsoft Sql Server 2025 (cu 2)
Microsoft microsoft Sql Server 2025 For X64-based Systems (gdr)

Tue, 10 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description Improper validation of specified type of input in SQL Server allows an authorized attacker to elevate privileges over a network.
Title SQL Server Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft sql Server 2016
Microsoft sql Server 2017
Microsoft sql Server 2019
Microsoft sql Server 2022
Microsoft sql Server 2025
Weaknesses CWE-1287
CPEs cpe:2.3:a:microsoft:sql_server_2016:*:sp3:*:*:*:*:x64:*
cpe:2.3:a:microsoft:sql_server_2017:*:-:*:*:*:*:x64:*
cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*
cpe:2.3:a:microsoft:sql_server_2025:*:*:*:*:*:*:x64:*
Vendors & Products Microsoft
Microsoft sql Server 2016
Microsoft sql Server 2017
Microsoft sql Server 2019
Microsoft sql Server 2022
Microsoft sql Server 2025
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Microsoft Sql Server 2016 Service Pack 3 (gdr) Microsoft Sql Server 2016 Service Pack 3 Azure Connect Feature Pack Microsoft Sql Server 2017 (cu 31) Microsoft Sql Server 2017 (gdr) Microsoft Sql Server 2019 (cu 32) Microsoft Sql Server 2019 (gdr) Microsoft Sql Server 2022 (gdr) Microsoft Sql Server 2022 For X64-based Systems (cu 23) Microsoft Sql Server 2025 (cu 2) Microsoft Sql Server 2025 For X64-based Systems (gdr) Sql Server 2016 Sql Server 2017 Sql Server 2019 Sql Server 2022 Sql Server 2025
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-03-27T22:32:57.392Z

Reserved: 2026-02-11T15:52:13.910Z

Link: CVE-2026-26115

cve-icon Vulnrichment

Updated: 2026-03-11T13:02:11.764Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T18:18:40.590

Modified: 2026-03-13T20:21:13.257

Link: CVE-2026-26115

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:34:18Z

Weaknesses