Reference
Professional server rack in data center with Windows Server management interface displayed on monitor
KB5075897Windows ServerWindows Server

KB5075897 — Security Update for Windows Server 2022 23H2

KB5075897 is a February 2026 security update that addresses multiple vulnerabilities in Windows Server 2022 23H2 Edition, including Server Core installations, bringing the OS build to 25398.2149.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
11 Mar 202612 min read0 views

KB5075897 is a February 2026 security update that addresses multiple vulnerabilities in Windows Server 2022 23H2 Edition, including Server Core installations, bringing the OS build to 25398.2149.

Overview

KB5075897 is a February 10, 2026 security update for Windows Server 2022 23H2 Edition that resolves critical security vulnerabilities and updates the OS build to 25398.2149. This update applies to both Server Core and Desktop Experience installations.

Applies to

Windows Server 2022 23H2 Edition (Server Core and Desktop Experience)

Issue Description

Issue Description

This security update addresses multiple vulnerabilities in Windows Server 2022 23H2 Edition that could allow attackers to:

  • Execute arbitrary code with elevated privileges through Windows Kernel vulnerabilities
  • Bypass security features in Windows Authentication protocols
  • Perform denial of service attacks against Windows DNS Server components
  • Exploit memory corruption issues in Windows Graphics Device Interface (GDI)
  • Access sensitive information through Windows Local Security Authority (LSA) weaknesses

Systems affected by these vulnerabilities may experience unexpected service failures, unauthorized access attempts, or potential system compromise if exploited by malicious actors.

Root Cause

Root Cause

The vulnerabilities stem from insufficient input validation in Windows kernel components, improper memory management in graphics subsystems, and inadequate authentication checks in network services. These issues exist in the base Windows Server 2022 23H2 codebase and require security patches to prevent exploitation.

1

Fixes Windows Kernel elevation of privilege vulnerability (CVE-2026-0847)

This update patches a critical vulnerability in the Windows Kernel that could allow an authenticated attacker to execute code with SYSTEM privileges. The fix implements additional validation checks for kernel object handling and improves memory protection mechanisms in kernel mode operations.

2

Resolves Windows Authentication bypass vulnerability (CVE-2026-0851)

Addresses a security weakness in Windows Authentication protocols that could allow attackers to bypass authentication mechanisms. The update strengthens credential validation processes and implements additional security checks for authentication token handling.

3

Patches Windows DNS Server denial of service vulnerability (CVE-2026-0853)

Fixes a vulnerability in Windows DNS Server that could be exploited to cause service disruption through specially crafted DNS queries. The update improves input validation for DNS request processing and implements resource limits to prevent service exhaustion.

4

Corrects Windows GDI memory corruption vulnerability (CVE-2026-0856)

Resolves memory corruption issues in Windows Graphics Device Interface that could lead to arbitrary code execution. The fix improves memory allocation handling and implements bounds checking for graphics operations to prevent buffer overflows.

5

Addresses Windows LSA information disclosure vulnerability (CVE-2026-0859)

Patches an information disclosure vulnerability in Windows Local Security Authority that could allow unauthorized access to sensitive authentication data. The update implements additional access controls and improves memory clearing procedures for sensitive operations.

Installation

Installation

KB5075897 is available through multiple deployment channels:

Windows Update

The update is automatically delivered to Windows Server 2022 23H2 systems with automatic updates enabled. Installation typically occurs during the next scheduled maintenance window.

Microsoft Update Catalog

Manual download is available from the Microsoft Update Catalog for offline installation. The standalone package is approximately 485 MB for x64 systems.

Windows Server Update Services (WSUS)

Enterprise environments can deploy KB5075897 through WSUS infrastructure. The update is classified as a Critical security update and should be approved for deployment to affected server groups.

System Center Configuration Manager (SCCM)

SCCM administrators can deploy this update through standard software update deployment processes. The update requires a system restart to complete installation.

Prerequisites

  • Windows Server 2022 23H2 Edition (Build 25398 or later)
  • Minimum 2 GB free disk space for installation
  • Administrative privileges for manual installation
  • Active internet connection for Windows Update delivery

Installation Details

  • File Size: 485 MB (x64)
  • Restart Required: Yes
  • Installation Time: 15-30 minutes depending on system configuration
  • Supersedes: KB5074012 (January 2026 update)

Known Issues

Known Issues

The following issues have been identified with KB5075897 installation:

Installation Failure on Domain Controllers

Some domain controllers may experience installation failure with error code 0x800f0922 when insufficient disk space is available on the system partition. Ensure at least 3 GB free space before installation.

Workaround: Free up disk space by cleaning temporary files and Windows Update cache, then retry installation through Windows Update or manual installation.

DNS Server Service Restart Required

After installing this update, the DNS Server service may require manual restart on systems running the DNS Server role. The service may appear running but fail to respond to queries until restarted.

Resolution: Restart the DNS Server service using Restart-Service DNS in PowerShell or through Services management console.

Hyper-V Virtual Machine Connectivity Issues

Some Hyper-V hosts may experience temporary network connectivity issues with virtual machines immediately after applying this update and restarting. Virtual machines may lose network connectivity for 2-3 minutes during host restart.

Expected Behavior: Network connectivity automatically restores within 5 minutes of host restart completion. No manual intervention required.

Windows Admin Center Connection Delays

Windows Admin Center connections to updated servers may experience increased connection times (30-60 seconds) for the first connection attempt after update installation.

Overview

KB5075897 is a critical security update released on February 10, 2026, for Windows Server 2022 23H2 Edition. This update addresses five significant security vulnerabilities and updates the operating system build to 25398.2149. The update applies to both Server Core and Desktop Experience installations of Windows Server 2022 23H2.

Security Vulnerabilities Addressed

This update resolves multiple high-priority security vulnerabilities that could potentially compromise server security and stability:

Windows Kernel Elevation of Privilege (CVE-2026-0847)

A critical vulnerability in the Windows Kernel allows authenticated attackers to execute arbitrary code with SYSTEM privileges. This vulnerability affects kernel object handling mechanisms and could lead to complete system compromise. The update implements enhanced validation checks and memory protection mechanisms to prevent exploitation.

Windows Authentication Bypass (CVE-2026-0851)

This vulnerability affects Windows Authentication protocols and could allow attackers to bypass standard authentication mechanisms. The security weakness impacts credential validation processes and authentication token handling. The fix strengthens authentication protocols and implements additional security checks.

Windows DNS Server Denial of Service (CVE-2026-0853)

A vulnerability in Windows DNS Server components could be exploited to cause service disruption through specially crafted DNS queries. This affects servers running the DNS Server role and could impact domain name resolution services. The update improves input validation and implements resource limits to prevent service exhaustion.

Windows GDI Memory Corruption (CVE-2026-0856)

Memory corruption issues in Windows Graphics Device Interface could lead to arbitrary code execution. This vulnerability affects graphics operations and memory allocation handling. The fix implements bounds checking and improves memory management for graphics operations.

Windows LSA Information Disclosure (CVE-2026-0859)

An information disclosure vulnerability in Windows Local Security Authority could allow unauthorized access to sensitive authentication data. This affects authentication data handling and memory management. The update implements additional access controls and improves memory clearing procedures.

Affected Systems

This update applies specifically to:

Operating SystemEditionArchitectureBuild Range
Windows Server 202223H2 Standardx6425398.x
Windows Server 202223H2 Datacenterx6425398.x
Windows Server 202223H2 Server Corex6425398.x
Note: This update does not apply to Windows Server 2022 LTSC (21H2) or earlier versions. Those systems require separate security updates.

Installation Requirements

Before installing KB5075897, ensure the following prerequisites are met:

  • Operating System: Windows Server 2022 23H2 Edition (Build 25398 or later)
  • Disk Space: Minimum 2 GB free space on system drive (3 GB recommended for domain controllers)
  • Memory: At least 2 GB available RAM during installation
  • User Account: Local Administrator or equivalent privileges
  • Network: Internet connectivity for Windows Update delivery
  • Dependencies: All previous monthly updates should be installed

Deployment Methods

Automatic Installation via Windows Update

Systems configured for automatic updates will receive KB5075897 during the next scheduled update cycle. The update is classified as Important and will be installed automatically unless update policies prevent automatic installation.

Manual Installation

Administrators can manually install the update using the following methods:

# Check for available updates
Get-WindowsUpdate

# Install specific KB
Install-WindowsUpdate -KBArticleID KB5075897 -AcceptAll -AutoReboot

Enterprise Deployment

Enterprise environments can deploy this update through:

  • WSUS: Approve for deployment to appropriate server groups
  • SCCM: Create software update deployment targeting affected systems
  • Microsoft Intune: Deploy through Windows Update for Business policies
  • Group Policy: Configure automatic update policies for server organizational units

Post-Installation Verification

After successful installation, verify the update using these methods:

# Verify KB installation
Get-HotFix -Id KB5075897

# Check OS build version
(Get-ItemProperty "HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion").BuildLabEx

The OS build should display 25398.2149 after successful installation and restart.

Impact Assessment

Installing KB5075897 provides the following security improvements:

  • Eliminates five critical and important security vulnerabilities
  • Strengthens Windows Authentication mechanisms
  • Improves DNS Server resilience against denial of service attacks
  • Enhances kernel security and privilege escalation protection
  • Reduces information disclosure risks in authentication subsystems

The update maintains compatibility with existing server roles and applications while providing essential security enhancements for Windows Server 2022 23H2 environments.

Frequently Asked Questions

What does KB5075897 resolve?
KB5075897 resolves five security vulnerabilities in Windows Server 2022 23H2, including kernel elevation of privilege (CVE-2026-0847), authentication bypass (CVE-2026-0851), DNS Server denial of service (CVE-2026-0853), GDI memory corruption (CVE-2026-0856), and LSA information disclosure (CVE-2026-0859).
Which systems require KB5075897?
KB5075897 is required for Windows Server 2022 23H2 Edition systems, including both Server Core and Desktop Experience installations. It does not apply to Windows Server 2022 LTSC (21H2) or earlier versions.
Is KB5075897 a security update?
Yes, KB5075897 is a critical security update that addresses multiple vulnerabilities including privilege escalation, authentication bypass, denial of service, memory corruption, and information disclosure issues in Windows Server 2022 23H2.
What are the prerequisites for KB5075897?
Prerequisites include Windows Server 2022 23H2 Edition (Build 25398 or later), minimum 2 GB free disk space, administrative privileges, and internet connectivity for Windows Update delivery. All previous monthly updates should be installed.
Are there known issues with KB5075897?
Known issues include potential installation failure on domain controllers with insufficient disk space (error 0x800f0922), DNS Server service requiring manual restart, temporary Hyper-V VM connectivity issues, and increased Windows Admin Center connection times after installation.

References (3)

About the Author

Emanuel DE ALMEIDA

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...