Windows RRAS Remote Code Execution Vulnerability (CVE-2026-26111) - SE-RCE Exploit
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读用户提供的文章内容,了解主要信息。 文章标题是关于Windows RRAS的一个远程代码执行漏洞,CVE编号是2026-26111。作者是nu11secur1ty,日期是2026年3月19日。软件是Windows RRAS服务,微软已经发布了补丁KB5084597。 描述部分提到这是一个关键的漏洞,由整数溢出导致堆缓冲区溢出。攻击者可以通过特制的RPC响应触发,认证域用户连接到恶意RRAS服务器即可。CVSS评分是8.8,属于高危。 Payload部分用了XOR混淆的shellcode,长度字段设为0xFFFFFFFF触发溢出。Shellcode会收集系统信息并回传到4445端口。 总结的时候要包括漏洞名称、影响、原因、攻击条件、CVSS评分和补丁情况。控制在100字以内,所以要简洁明了。 最后检查一下是否符合要求:不使用特定开头语句,直接描述内容。确保所有关键点都涵盖进去。 </think> 微软Windows RRAS服务存在远程代码执行漏洞(CVE-2026-26111),由整数溢出引发堆缓冲区溢出。认证域用户连接恶意RRAS服务器可触发漏洞,执行高权限代码。CVSS评分8.8(高危),已修复(KB5084597)。 2026-3-21 22:2:8 Author: cxsecurity.com(查看原文) 阅读量:8 收藏

# Titles: Windows RRAS Remote Code Execution Vulnerability (CVE-2026-26111) - SE-RCE Exploit # Author: nu11secur1ty # Date: 19.03.2026 # Vendor: Microsoft # Software: Windows RRAS (Routing and Remote Access Service) # Reference: https://www.cve.org/CVERecord?id=CVE-2026-26111 ## Description: A critical remote code execution vulnerability exists in the Microsoft Windows Routing and Remote Access Service (RRAS). The vulnerability is caused by an integer overflow (CWE-190) leading to a heap-based buffer overflow (CWE-122) when parsing specially crafted RPC responses. An authenticated domain user connecting to a malicious RRAS server can trigger this vulnerability, allowing the attacker to execute arbitrary code on the target system with high privileges. The CVSS score is 8.8 (HIGH) with vector AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. STATUS: CRITICAL - PATCHED BY MICROSOFT (KB5084597) [+]Payload: The payload consists of XOR-obfuscated shellcode (key 0xAA) embedded in a malformed RPC response with a length field set to 0xFFFFFFFF. This triggers the integer overflow and allows the shellcode to execute on the target system. The shellcode performs system information enumeration and exfiltrates data back to the attacker on port 4445. Example payload structure: - RPC Header (0x05 0x00 0x0b 0x03 0x10) - Integer Overflow Trigger (0xFFFFFFFF) - XOR-obfuscated shellcode (generated with msfvenom) - NOP sled (0x90 padding) # Reproduce: [href](https://github.com/nu11secur1ty/Windows11Exploits/tree/main/2026/CVE-2026-26111) # Demo: [href](https://www.patreon.com/posts/windows-rras-cve-153417054) # Time spent: 02:45:00 -- System Administrator - Infrastructure Engineer Penetration Testing Engineer Exploit developer at https://packetstormsecurity.com/ https://cve.mitre.org/index.html https://cxsecurity.com/ and https://www.exploit-db.com/ home page: https://www.asc3t1c-nu11secur1ty.com/ hiPEnIMR0v7QCo/+SEH9gBclAAYWGnPoBIQ75sCj60E= nu11secur1ty <https://www.asc3t1c-nu11secur1ty.com/>



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2026030030
如有侵权请联系:admin#unsafe.sh