<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sql_server — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sql_server/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 18:45:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sql_server/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-40370: SQL Server External Control of File Name or Path Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40370/</link><pubDate>Tue, 12 May 2026 18:45:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40370/</guid><description>CVE-2026-40370 allows an authorized attacker with control over file names or paths to execute code over a network in Microsoft SQL Server.</description><content:encoded><![CDATA[<p>CVE-2026-40370 is a vulnerability affecting Microsoft SQL Server. The vulnerability stems from the external control of file names or paths, which allows an authorized attacker to execute arbitrary code over a network. This means that if an attacker can influence the path or filename used by SQL Server in certain operations, they can potentially inject and execute malicious code. This vulnerability poses a significant risk to organizations using SQL Server, as successful exploitation could lead to complete system compromise, data breaches, or denial-of-service conditions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authorized user gains the ability to specify a file path or name used by SQL Server. This might be through a stored procedure or other interface.</li>
<li>The attacker crafts a malicious file path or name that contains code to be executed. This can involve command injection.</li>
<li>SQL Server attempts to access the file based on the attacker-controlled path.</li>
<li>Due to insufficient sanitization or validation of the file path, the injected code is interpreted as a command.</li>
<li>SQL Server executes the attacker&rsquo;s malicious code with the privileges of the SQL Server process.</li>
<li>The attacker gains control over the SQL Server instance.</li>
<li>The attacker uses the compromised SQL Server instance to access sensitive data, modify databases, or pivot to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40370 allows an authorized attacker to execute arbitrary code on the SQL Server with the privileges of the SQL Server service account. This can lead to complete system compromise, allowing the attacker to steal sensitive data, modify databases, install backdoors, or use the compromised server as a staging point for further attacks within the network. The vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-40370 as soon as possible (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40370)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40370)</a>.</li>
<li>Monitor SQL Server logs for suspicious file access patterns or attempts to execute commands from unusual locations.</li>
<li>Implement strict input validation and sanitization for any user-supplied file paths or names used by SQL Server.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>sql_server</category><category>rce</category></item></channel></rss>