SQL Server RCE: Untrusted Pointer Dereference
A critical remote code execution (RCE) vulnerability, tracked as CVE-2026-33120, has been identified in SQL Server. The National Vulnerability Database reports this as an untrusted pointer dereference flaw, which could allow an authorized attacker to execute arbitrary code over a network.
Rated with a high CVSS score of 8.8, this vulnerability (CWE-822) presents a significant risk. While the National Vulnerability Database has not specified affected product versions, the nature of RCE in a widely used database like SQL Server means organizations need to be vigilant. An attacker with even low-level authentication could potentially leverage this to gain significant control, making it a severe concern for data integrity and system security.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 5 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — SQL Server RCE: Untrusted Pointer Derefe
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-33120 | RCE | Microsoft SQL Server |
| CVE-2026-33120 | RCE | Untrusted pointer dereference |