8.8
HIGH CVSS 3.1
CVE-2026-21262
SQL Server Elevation of Privilege Vulnerability
Description

Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.

INFO

Published Date :

March 10, 2026, 6:18 p.m.

Last Modified :

March 13, 2026, 7:33 p.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2026-21262 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Microsoft sql_server_2016
2 Microsoft sql_server_2017
3 Microsoft sql_server_2019
4 Microsoft sql_server_2022
5 Microsoft sql_server_2025
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH [email protected]
Solution
Restrict SQL Server access and apply vendor patches to prevent privilege escalation.
  • Enforce least privilege access controls.
  • Apply SQL Server security updates promptly.
  • Monitor access logs for suspicious activity.
  • Configure network access controls.
Public PoC/Exploit Available at Github

CVE-2026-21262 has a 3 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2026-21262.

URL Resource
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21262 Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-21262 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

This reposityory will be used to store my public portfolio

PowerShell

Updated: 1 hour, 37 minutes ago
0 stars 0 fork 0 watcher
Born at : March 21, 2026, 2:58 p.m. This repo has been linked 5 different CVEs too.

Sentinel detection lab for MCP attack chains: CVE-2026-26118 SSRF token theft, tool poisoning, cross-server exfiltration, identity post-exploitation. Maps to OWASP Agentic Top 10. 5 analytics rules, 7 hunting queries, workbook. Companion to nineliveszerotrust.com.

PowerShell

Updated: 2 weeks, 5 days ago
0 stars 0 fork 0 watcher
Born at : March 17, 2026, 4:37 p.m. This repo has been linked 3 different CVEs too.

Report Template

Updated: 3 weeks, 3 days ago
0 stars 0 fork 0 watcher
Born at : Oct. 11, 2023, 3:51 p.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-21262 vulnerability anywhere in the article.

  • Help Net Security
Week in review: AiTM phishing kit used to hijack AWS accounts, year-long malware campaign targets HR

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Turning expertise into opportunity for women in cybersecurity Speaker diversity in cybersecurity has b ... Read more

Published Date: Mar 15, 2026 (3 weeks ago)
  • SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 11

The Good | Authorities Disrupt Proxy Network and Charge BlackCat Insider, Vendors Patch Critical RCE Bugs U.S. and European law enforcement have dismantled the SocksEscort cybercrime proxy network, wh ... Read more

Published Date: Mar 13, 2026 (3 weeks, 2 days ago)
  • SentinelOne
The Good, the Bad and the Ugly in Cybersecurity – Week 11

The Good | Authorities Disrupt Proxy Network and Charge BlackCat Insider, Vendors Patch Critical RCE Bugs U.S. and European law enforcement have dismantled the SocksEscort cybercrime proxy network, wh ... Read more

Published Date: Mar 13, 2026 (3 weeks, 2 days ago)
  • Help Net Security
Microsoft patches 80+ vulnerabilities, six flagged as “more likely” to be exploited

On March 2026 Patch Tuesday, Microsoft addressed 80+ vulnerabilities affecting its software and cloud services. Of these, two were publicly disclosed, but not actively exploited. Privilege escalation ... Read more

Published Date: Mar 11, 2026 (3 weeks, 4 days ago)
  • Hackread - Cybersecurity News, Data Breaches, AI and More
Microsoft Fixes 79 Flaws in March Patch Tuesday, Including Two 0-Days

Microsoft has released its March 2026 Patch Tuesday security updates, addressing dozens of vulnerabilities across Windows, enterprise platforms, and developer frameworks. The monthly update resolves 7 ... Read more

Published Date: Mar 11, 2026 (3 weeks, 4 days ago)
  • The Hacker News
Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that have been listed as publicly known. Of these, eight are rat ... Read more

Published Date: Mar 11, 2026 (3 weeks, 4 days ago)
  • The Cyber Express
Microsoft Patch Tuesday March 2026: Two Zero-Days and Critical RCE Bugs Fixed

The Microsoft Patch Tuesday March 2026 release introduces security updates addressing 79 vulnerabilities, including two publicly disclosed zero-day vulnerabilities and several high-risk issues tied to ... Read more

Published Date: Mar 11, 2026 (3 weeks, 4 days ago)
  • CrowdStrike.com
March 2026 Patch Tuesday: Eight Critical Vulnerabilities and Two Publicly Disclosed Among 82 CVEs Patched

Microsoft has addressed 82 vulnerabilities in its March 2026 security update release. These include two publicly disclosed vulnerabilities and eight Critical vulnerabilities. This month's leading risk ... Read more

Published Date: Mar 11, 2026 (3 weeks, 4 days ago)
  • CybersecurityNews
Microsoft SQL Server Zero-Day Vulnerability Allows Attackers to Escalate Privileges

Microsoft has disclosed a critical zero-day vulnerability in SQL Server that allows authenticated attackers to escalate their privileges to the highest administrative level on affected database system ... Read more

Published Date: Mar 11, 2026 (3 weeks, 4 days ago)
  • Daily CyberSecurity
Microsoft Patch Tuesday March 2026: 93 Vulnerabilities Addressed, Including Two Zero-Days

The March 2026 edition of Microsoft Patch Tuesday has arrived, bringing a massive wave of security updates to protect enterprise and consumer environments. This month, Microsoft has addressed a total ... Read more

Published Date: Mar 11, 2026 (3 weeks, 4 days ago)
  • TheCyberThrone
Microsoft Patch Tuesday – March 2026

Released: March 10, 2026Executive SummaryMicrosoft’s March 2026 Patch Tuesday addresses 83 vulnerabilities across Windows, Microsoft Office, SQL Server, Azure cloud services, and .NET — with 8 rated C ... Read more

Published Date: Mar 11, 2026 (3 weeks, 4 days ago)
  • The Register
Critical Microsoft Excel bug weaponizes Copilot Agent for zero-click information disclosure attack

After a whopper of a Patch Tuesday last month, with six Microsoft flaws exploited as zero-days, March didn't exactly roar in like a lion. Just two of the 83 Microsoft CVEs released on Tuesday are list ... Read more

Published Date: Mar 10, 2026 (3 weeks, 4 days ago)

The following table lists the changes that have been made to the CVE-2026-21262 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Mar. 13, 2026

    Action Type Old Value New Value
    Added CPE Configuration OR *cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:* versions from (including) 13.0.6300.2 up to (excluding) 13.0.6480.4 *cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:* versions from (including) 13.0.7000.253 up to (excluding) 13.0.7075.5 *cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:* versions from (including) 14.0.1000.169 up to (excluding) 14.0.2100.4 *cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:* versions from (including) 14.0.3006.16 up to (excluding) 14.0.3520.4 *cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:* versions from (including) 15.0.4003.23 up to (excluding) 15.4460.4 *cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:* versions from (including) 16.0.1000.6 up to (excluding) 16.0.1170.5 *cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:* versions from (including) 16.0.4003.1 up to (excluding) 16.0.4240.4 *cpe:2.3:a:microsoft:sql_server_2025:*:*:*:*:*:*:x64:* versions from (including) 17.0.1000.7 up to (excluding) 17.0.1105.2 *cpe:2.3:a:microsoft:sql_server_2025:*:*:*:*:*:*:x64:* versions from (including) 17.0.4006.2 up to (excluding) 17.0.4020.2 *cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:* versions from (including) 15.0.2000.5 up to (excluding) 15.0.2160.4
    Added Reference Type Microsoft Corporation: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21262 Types: Vendor Advisory
  • New CVE Received by [email protected]

    Mar. 10, 2026

    Action Type Old Value New Value
    Added Description Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.
    Added CVSS V3.1 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-284
    Added Reference https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21262
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.