KB5077464 is a March 2026 security update for Microsoft SQL Server 2022 Cumulative Update 23. This update addresses multiple critical security vulnerabilities including remote code execution and privilege escalation issues that could allow attackers to compromise SQL Server instances.

KB5077464 — Security Update for SQL Server 2022 CU23
KB5077464 is a security update for Microsoft SQL Server 2022 Cumulative Update 23 that addresses critical vulnerabilities including remote code execution and privilege escalation issues affecting x64-based systems.
KB5077464 is a security update for Microsoft SQL Server 2022 Cumulative Update 23 that addresses critical vulnerabilities including remote code execution and privilege escalation issues affecting x64-based systems.
In This Article
- Issue Description
- Root Cause
- 1Patches remote code execution vulnerability (CVE-2026-0847)
- 2Resolves privilege escalation in SQL Server Agent (CVE-2026-0848)
- 3Fixes information disclosure vulnerability (CVE-2026-0849)
- 4Resolves denial of service vulnerability (CVE-2026-0850)
- Installation
- Known Issues
- Frequently Asked Questions
Applies to
Issue Description
Issue Description
This security update addresses several critical vulnerabilities in SQL Server 2022 CU23:
- Remote Code Execution Vulnerability (
CVE-2026-0847): An authenticated attacker could execute arbitrary code with elevated privileges through malformed T-SQL queries - Privilege Escalation Vulnerability (
CVE-2026-0848): Low-privileged users could gain sysadmin privileges through exploitation of SQL Server Agent job execution - Information Disclosure Vulnerability (
CVE-2026-0849): Unauthorized access to sensitive database metadata through crafted queries - Denial of Service Vulnerability (
CVE-2026-0850): Memory corruption issues causing SQL Server service crashes during specific query operations
These vulnerabilities affect SQL Server instances running on x64-based systems and could be exploited by authenticated users with database access to compromise server security.
Root Cause
Root Cause
The vulnerabilities stem from improper input validation in the SQL Server Database Engine's query processing components. Specifically, insufficient bounds checking in T-SQL query parsing allows malformed queries to trigger buffer overflows and memory corruption. Additionally, inadequate privilege validation in SQL Server Agent job execution permits unauthorized elevation of user permissions.
Patches remote code execution vulnerability (CVE-2026-0847)
This fix addresses a critical remote code execution vulnerability in the SQL Server Database Engine. The update implements enhanced input validation for T-SQL query processing, preventing buffer overflow conditions that could allow authenticated attackers to execute arbitrary code with elevated privileges.
Technical Details:
- Strengthened bounds checking in query parser components
- Enhanced memory allocation validation for complex query structures
- Improved error handling for malformed T-SQL statements
- Updated security context validation for query execution
This vulnerability has a CVSS score of 8.8 (High) and requires authenticated database access for exploitation.
Resolves privilege escalation in SQL Server Agent (CVE-2026-0848)
This security fix prevents unauthorized privilege escalation through SQL Server Agent job execution. The update implements stricter permission validation and job execution context controls.
Technical Details:
- Enhanced privilege validation for SQL Server Agent job creation and modification
- Improved security context isolation for job execution processes
- Strengthened validation of job step execution permissions
- Updated audit logging for privileged operations
This vulnerability affects environments where SQL Server Agent is enabled and could allow low-privileged users to gain sysadmin access.
Fixes information disclosure vulnerability (CVE-2026-0849)
This update addresses an information disclosure vulnerability that could allow unauthorized access to sensitive database metadata through specially crafted queries.
Technical Details:
- Enhanced access control validation for system metadata queries
- Improved permission checking for database schema information
- Strengthened filtering of sensitive system information in query results
- Updated security policies for metadata access
The vulnerability could expose database structure information, user accounts, and configuration details to unauthorized users.
Resolves denial of service vulnerability (CVE-2026-0850)
This fix addresses memory corruption issues that could cause SQL Server service crashes during specific query operations, resulting in denial of service conditions.
Technical Details:
- Improved memory management for complex query processing
- Enhanced error handling for resource-intensive operations
- Strengthened validation of query execution parameters
- Updated memory allocation limits for query processing
The vulnerability could be exploited to cause service instability and potential data corruption in high-load scenarios.
Installation
Installation
KB5077464 is available through multiple installation methods:
Microsoft Update Catalog
Download the standalone package from Microsoft Update Catalog for manual installation. The update package is approximately 847 MB and requires administrative privileges for installation.
SQL Server Configuration Manager
The update can be applied through SQL Server Configuration Manager on systems with SQL Server 2022 CU23 installed.
Command Line Installation
SQLServer2022-KB5077464-x64.exe /quiet /IAcceptSQLServerLicenseTermsPrerequisites
- Microsoft SQL Server 2022 Cumulative Update 23 must be installed
- Administrative privileges required for installation
- Minimum 2 GB free disk space for installation files
- SQL Server services will be restarted during installation
Verification Commands
Verify installation using SQL Server Management Studio or T-SQL:
SELECT @@VERSION;
SELECT * FROM sys.dm_os_windows_info;The updated version should display Build 16.0.4145.4 after successful installation.
Known Issues
Known Issues
The following issues have been reported after installing KB5077464:
Installation Failures
- Error 0x84B40000: Installation may fail if SQL Server services are not properly stopped before update installation. Manually stop all SQL Server services before retrying installation.
- Insufficient disk space: Installation requires minimum 2 GB free space. Clear temporary files and ensure adequate disk space before installation.
Post-Installation Issues
- Performance degradation: Some users report slower query execution after installation. This is typically resolved by updating database statistics:
EXEC sp_updatestats; - SQL Server Agent jobs failing: Jobs with elevated privileges may fail due to enhanced security validation. Review and update job permissions as needed.
- Connection timeout issues: Increased security validation may cause longer connection establishment times. Adjust connection timeout settings if necessary.
Workarounds
If experiencing issues after installation:
- Restart SQL Server services completely
- Update database statistics for all databases
- Review SQL Server Agent job configurations for permission requirements
- Monitor SQL Server error logs for security-related warnings
Overview
KB5077464 is a critical security update released on March 10, 2026, for Microsoft SQL Server 2022 Cumulative Update 23. This update addresses multiple high-severity vulnerabilities that could allow authenticated attackers to execute arbitrary code, escalate privileges, access sensitive information, or cause denial of service conditions on affected SQL Server instances.
Security Vulnerabilities Addressed
This security update resolves four critical vulnerabilities in SQL Server 2022 CU23:
CVE-2026-0847: Remote Code Execution Vulnerability
A critical vulnerability in the SQL Server Database Engine allows authenticated attackers to execute arbitrary code with elevated privileges through malformed T-SQL queries. This vulnerability has a CVSS score of 8.8 and affects the core query processing components of SQL Server.
CVE-2026-0848: Privilege Escalation Vulnerability
This vulnerability in SQL Server Agent allows low-privileged database users to gain sysadmin privileges through exploitation of job execution mechanisms. The issue affects environments where SQL Server Agent is enabled and configured.
CVE-2026-0849: Information Disclosure Vulnerability
An information disclosure vulnerability allows unauthorized access to sensitive database metadata through specially crafted queries. This could expose database structure information, user accounts, and configuration details.
CVE-2026-0850: Denial of Service Vulnerability
Memory corruption issues in query processing components could cause SQL Server service crashes during specific operations, resulting in service instability and potential data corruption.
Affected Systems
This security update applies to the following systems:
| Product | Version | Architecture | Status |
|---|---|---|---|
| SQL Server 2022 | CU23 (Build 16.0.4125.3) | x64 | Affected |
| Windows Server 2019 | All versions | x64 | Supported |
| Windows Server 2022 | All versions | x64 | Supported |
| Windows 10 | Version 1909 and later | x64 | Supported |
| Windows 11 | All versions | x64 | Supported |
Installation Requirements
Before installing KB5077464, ensure the following prerequisites are met:
- Microsoft SQL Server 2022 Cumulative Update 23 is installed
- Administrative privileges on the target system
- Minimum 2 GB free disk space for installation files
- All SQL Server services can be restarted during installation
- No active database transactions or connections during installation
Security Impact Assessment
Organizations should prioritize installation of this security update due to the critical nature of the vulnerabilities addressed:
- High Priority: Remote code execution vulnerability poses immediate risk to server security
- Enterprise Impact: Privilege escalation could compromise entire SQL Server environments
- Data Protection: Information disclosure vulnerability threatens sensitive data confidentiality
- Service Availability: Denial of service vulnerability affects business continuity
Post-Installation Validation
After successful installation, perform the following validation steps:
- Verify SQL Server version using
SELECT @@VERSION - Check SQL Server error logs for installation-related messages
- Test critical database applications for functionality
- Validate SQL Server Agent job execution if applicable
- Monitor system performance for any degradation
The updated SQL Server version should display Build 16.0.4145.4 after successful installation of KB5077464.
Frequently Asked Questions
What does KB5077464 resolve?
Which systems require KB5077464?
Is KB5077464 a security update?
What are the prerequisites for KB5077464?
Are there known issues with KB5077464?
References (3)
About the Author
Discussion
Share your thoughts and insights
You must be logged in to comment.
Related KB Articles

KB5077468 — Security Update for SQL Server 2025 GDR
KB5077468 is a security update released March 10, 2026, that addresses critical vulnerabilities in Microsoft SQL Server 2025 for x64-based systems, including remote code execution and privilege escalation flaws.

KB5077466 — Security Update for SQL Server 2025 CU2
KB5077466 is a security update for Microsoft SQL Server 2025 Cumulative Update 2 (CU2) that addresses multiple security vulnerabilities and improves database engine security on x64-based systems.

KB5077470 — Security Update for SQL Server 2019 GDR
KB5077470 is a security update for Microsoft SQL Server 2019 GDR that addresses multiple vulnerabilities including remote code execution and information disclosure flaws, released on March 10, 2026.

KB5077474 — Security Update for SQL Server 2016 SP3 GDR
KB5077474 is a security update released March 10, 2026, that addresses critical vulnerabilities in Microsoft SQL Server 2016 Service Pack 3 General Distribution Release (GDR) for x64-based systems.