WID-SEC-2026-1103: Critical Microsoft SQL Server Vulnerabilities Allow Code Execution and Privilege Elevation
Summary
CERT-Bund issued security advisory WID-SEC-2026-1103 warning of multiple critical vulnerabilities in Microsoft SQL Server 2016, 2017, 2019, and 2022. The flaws carry a CVSS Base Score of 8.8 (high) and a Temporal Score of 7.7 (high). Attackers can exploit these vulnerabilities remotely to execute arbitrary code and escalate privileges. Mitigations are available.
What changed
CERT-Bund published security advisory WID-SEC-2026-1103 documenting critical vulnerabilities in Microsoft SQL Server affecting versions 2016 through 2022. The vulnerabilities carry a CVSS Base Score of 8.8 (high) and enable remote attackers to execute arbitrary code and elevate privileges. The advisory confirms mitigations are available.
Organizations running affected Microsoft SQL Server versions should immediately apply available mitigations and patch updates. Database administrators and IT security teams should prioritize reviewing remote access controls to SQL Server instances and incorporate these vulnerabilities into vulnerability management processes.
What to do next
- Apply available mitigations to affected Microsoft SQL Server installations
- Update vulnerability management procedures for Microsoft SQL Server deployments
- Review remote access controls to SQL Server instances
Archived snapshot
Apr 15, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-1103] Microsoft SQL Server: Mehrere Schwachstellen CVSS Base Score 8.8 (hoch) CVSS Temporal Score 7.7 (hoch) Remoteangriff ja Datum 14.04.2026 Stand 15.04.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Windows
Produktbeschreibung
Der Microsoft SQL Server ist ein relationales Datenbankmanagementsystem von Microsoft.
Der Microsoft SQL Server ist ein relationales Datenbankmanagementsystem von Microsoft.
Produkte
14.04.2026
- Microsoft SQL Server 2022 (CU 24)
Microsoft SQL Server 2017 (GDR)
Microsoft SQL Server 2019 (GDR)
Microsoft SQL Server 2016 SP3 (GDR)
Microsoft SQL Server 2016 SP3 Azure Connect Feature Pack
Microsoft SQL Server 2017 (CU 31)
Microsoft SQL Server 2022 (GDR)
Microsoft SQL Server 2019 (CU 32)
Angriff
Angriff
Ein Angreifer kann mehrere Schwachstellen in Microsoft SQL Server 2017, Microsoft SQL Server 2019, Microsoft SQL Server 2016 und Microsoft SQL Server 2022 ausnutzen, um beliebigen Programmcode auszuführen, und um seine Privilegien zu erhöhen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.