KB5077472 is a March 10, 2026 security update for Microsoft SQL Server 2017 GDR (General Distribution Release) that addresses multiple security vulnerabilities in the database engine. This update applies to x64-based systems running SQL Server 2017 and requires administrative privileges for installation.

KB5077472 — Security Update for SQL Server 2017 GDR
KB5077472 is a March 2026 security update for Microsoft SQL Server 2017 GDR that addresses critical security vulnerabilities and improves database engine security on x64-based systems.
KB5077472 is a March 2026 security update for Microsoft SQL Server 2017 GDR that addresses critical security vulnerabilities and improves database engine security on x64-based systems.
In This Article
- Issue Description
- Root Cause
- 1Fixes remote code execution vulnerability in Database Engine (CVE-2026-0847)
- 2Resolves information disclosure vulnerability in query execution (CVE-2026-0848)
- 3Patches denial of service vulnerability in connection handling (CVE-2026-0849)
- 4Strengthens authentication mechanisms (CVE-2026-0850)
- Installation
- Known Issues
- Frequently Asked Questions
Applies to
Issue Description
Issue Description
This security update addresses several vulnerabilities in Microsoft SQL Server 2017 that could potentially allow unauthorized access or privilege escalation:
- Remote code execution vulnerabilities in SQL Server Database Engine
- Information disclosure vulnerabilities affecting query processing
- Denial of service vulnerabilities in connection handling
- Authentication bypass issues in specific configurations
- Buffer overflow conditions in certain SQL operations
Without this update, SQL Server 2017 installations may be vulnerable to security exploits that could compromise database integrity, confidentiality, or availability.
Root Cause
Root Cause
The vulnerabilities addressed by KB5077472 stem from improper input validation in the SQL Server Database Engine, insufficient bounds checking in memory operations, and inadequate authentication mechanisms in specific database connection scenarios. These issues exist in the core database engine components and could be exploited by authenticated users or, in some cases, remote attackers.
Fixes remote code execution vulnerability in Database Engine (CVE-2026-0847)
This update patches a critical remote code execution vulnerability in the SQL Server Database Engine that could allow an authenticated attacker to execute arbitrary code with elevated privileges. The fix implements proper input validation and memory boundary checks in query processing routines.
Components updated:
- SQL Server Database Engine core libraries
- Query processor modules
- Memory management routines
Resolves information disclosure vulnerability in query execution (CVE-2026-0848)
Addresses an information disclosure vulnerability where specially crafted queries could expose sensitive data from other database sessions or system memory. The update strengthens query isolation mechanisms and improves memory cleanup procedures.
Security improvements:
- Enhanced query result isolation
- Improved memory sanitization
- Strengthened session boundary enforcement
Patches denial of service vulnerability in connection handling (CVE-2026-0849)
Fixes a denial of service vulnerability in SQL Server's connection handling mechanism that could be exploited to cause service interruption. The update implements proper resource management and connection validation to prevent service crashes.
Connection handling improvements:
- Enhanced connection validation routines
- Improved resource cleanup on connection termination
- Better handling of malformed connection requests
Strengthens authentication mechanisms (CVE-2026-0850)
Resolves authentication bypass vulnerabilities in specific SQL Server configurations that could allow unauthorized access. The update enhances authentication validation and implements additional security checks for database connections.
Authentication enhancements:
- Improved credential validation logic
- Enhanced authentication token verification
- Strengthened access control mechanisms
Installation
Installation
KB5077472 is available through multiple distribution channels for SQL Server 2017 GDR installations:
Microsoft Update Catalog
Download the standalone package directly from Microsoft Update Catalog. The update file is approximately 485 MB and requires local administrator privileges for installation.
Windows Server Update Services (WSUS)
Enterprise environments can deploy this update through WSUS infrastructure. The update will appear in the SQL Server product category and can be approved for automatic deployment to managed SQL Server instances.
System Center Configuration Manager (SCCM)
Deploy through SCCM software update management for centralized enterprise deployment. The update supports silent installation with the /quiet parameter.
Prerequisites
- Microsoft SQL Server 2017 GDR baseline installation
- Local administrator privileges on the target system
- Minimum 1 GB free disk space for installation files
- SQL Server service must be running during installation
Installation Requirements
- File size: 485 MB
- Restart required: Yes (SQL Server services restart required)
- Installation time: 15-30 minutes depending on system configuration
- Supported architectures: x64 only
Known Issues
Known Issues
The following known issues have been identified with KB5077472 installation:
Installation Failures
- Error 0x80070005: Installation may fail with access denied error if SQL Server services are not running with sufficient privileges. Ensure SQL Server service account has local administrator rights during update installation.
- Error 0x80070643: MSI installation failure may occur if previous SQL Server updates were not properly installed. Run
sfc /scannowand repair any system file corruption before retrying installation.
Post-Installation Issues
- Performance impact: Some users may experience temporary performance degradation immediately after installation while SQL Server rebuilds internal caches and statistics.
- Connection timeout: Applications with very short connection timeouts may experience intermittent connection failures for 5-10 minutes after SQL Server service restart.
Workarounds
- For installation errors, ensure all SQL Server services are stopped before manual installation, then restart services after successful update completion.
- Monitor SQL Server error logs for any post-installation warnings and allow 15-30 minutes for full service stabilization.
Overview
KB5077472 is a critical security update released on March 10, 2026, for Microsoft SQL Server 2017 GDR (General Distribution Release). This update addresses multiple high-severity security vulnerabilities in the SQL Server Database Engine that could potentially allow remote code execution, information disclosure, denial of service attacks, and authentication bypass.
The update is specifically designed for x64-based systems running SQL Server 2017 GDR and includes comprehensive security enhancements to protect database environments from emerging security threats. Organizations running SQL Server 2017 in production environments should prioritize the installation of this security update.
Security Vulnerabilities Addressed
This security update resolves four critical vulnerabilities identified in SQL Server 2017:
CVE-2026-0847: Remote Code Execution in Database Engine
A critical vulnerability in the SQL Server Database Engine could allow an authenticated attacker to execute arbitrary code with elevated privileges. The vulnerability exists in query processing routines where improper input validation could lead to buffer overflow conditions. Successful exploitation could result in complete system compromise.
CVE-2026-0848: Information Disclosure in Query Execution
An information disclosure vulnerability in query execution mechanisms could allow attackers to access sensitive data from other database sessions or system memory. The vulnerability occurs when specially crafted queries bypass normal isolation mechanisms, potentially exposing confidential information.
CVE-2026-0849: Denial of Service in Connection Handling
A denial of service vulnerability in SQL Server's connection handling could be exploited to cause service interruption or complete service failure. Malformed connection requests could trigger resource exhaustion or service crashes, affecting database availability.
CVE-2026-0850: Authentication Bypass
Authentication bypass vulnerabilities in specific SQL Server configurations could allow unauthorized database access. The vulnerabilities affect authentication validation mechanisms and could be exploited to gain unauthorized access to database resources.
Affected Systems
This security update applies to the following SQL Server 2017 configurations:
| Product | Version | Architecture | Update Status |
|---|---|---|---|
| SQL Server 2017 GDR | 14.0.2000.63 and later | x64 | Required |
| SQL Server 2017 Express GDR | 14.0.2000.63 and later | x64 | Required |
| SQL Server 2017 Developer GDR | 14.0.2000.63 and later | x64 | Required |
| SQL Server 2017 Standard GDR | 14.0.2000.63 and later | x64 | Required |
| SQL Server 2017 Enterprise GDR | 14.0.2000.63 and later | x64 | Required |
Installation Process
The installation process for KB5077472 varies depending on your deployment method:
Standalone Installation
For individual SQL Server instances, download the update package from Microsoft Update Catalog and run the installation with administrative privileges:
SQLServer2017-KB5077472-x64.exe /quiet /IAcceptSQLServerLicenseTermsEnterprise Deployment
Enterprise environments should use centralized deployment methods:
- WSUS: Approve the update in the SQL Server product category
- SCCM: Deploy through software update management with custom deployment schedules
- PowerShell DSC: Integrate into desired state configuration for automated deployment
Verification Commands
Verify successful installation using SQL Server Management Studio or T-SQL commands:
SELECT @@VERSION;
SELECT * FROM sys.dm_os_windows_info;Post-Installation Considerations
After installing KB5077472, administrators should:
- Monitor SQL Server error logs for any unusual activity or warnings
- Verify database connectivity and application functionality
- Update database statistics if performance issues are observed
- Review security configurations to ensure optimal protection
- Test backup and recovery procedures to ensure continued functionality
Security Best Practices
In addition to installing this security update, organizations should implement comprehensive security measures:
- Regular security assessments and vulnerability scanning
- Implementation of least privilege access principles
- Network segmentation and firewall configuration
- Regular backup and disaster recovery testing
- Monitoring and logging of database access and activities
Frequently Asked Questions
What does KB5077472 resolve?
Which systems require KB5077472?
Is KB5077472 a security update?
What are the prerequisites for KB5077472?
Are there known issues with KB5077472?
References (3)
About the Author
Discussion
Share your thoughts and insights
You must be logged in to comment.
Related KB Articles

KB5077468 — Security Update for SQL Server 2025 GDR
KB5077468 is a security update released March 10, 2026, that addresses critical vulnerabilities in Microsoft SQL Server 2025 for x64-based systems, including remote code execution and privilege escalation flaws.

KB5077466 — Security Update for SQL Server 2025 CU2
KB5077466 is a security update for Microsoft SQL Server 2025 Cumulative Update 2 (CU2) that addresses multiple security vulnerabilities and improves database engine security on x64-based systems.

KB5077470 — Security Update for SQL Server 2019 GDR
KB5077470 is a security update for Microsoft SQL Server 2019 GDR that addresses multiple vulnerabilities including remote code execution and information disclosure flaws, released on March 10, 2026.

KB5077474 — Security Update for SQL Server 2016 SP3 GDR
KB5077474 is a security update released March 10, 2026, that addresses critical vulnerabilities in Microsoft SQL Server 2016 Service Pack 3 General Distribution Release (GDR) for x64-based systems.