KB5075897 is a February 10, 2026 security update for Windows Server 2022 23H2 Edition that resolves critical security vulnerabilities and updates the OS build to 25398.2149. This update applies to both Server Core and Desktop Experience installations.

KB5075897 — Security Update for Windows Server 2022 23H2
KB5075897 is a February 2026 security update that addresses multiple vulnerabilities in Windows Server 2022 23H2 Edition, including Server Core installations, bringing the OS build to 25398.2149.
KB5075897 is a February 2026 security update that addresses multiple vulnerabilities in Windows Server 2022 23H2 Edition, including Server Core installations, bringing the OS build to 25398.2149.
In This Article
- Issue Description
- Root Cause
- 1Fixes Windows Kernel elevation of privilege vulnerability (CVE-2026-0847)
- 2Resolves Windows Authentication bypass vulnerability (CVE-2026-0851)
- 3Patches Windows DNS Server denial of service vulnerability (CVE-2026-0853)
- 4Corrects Windows GDI memory corruption vulnerability (CVE-2026-0856)
- 5Addresses Windows LSA information disclosure vulnerability (CVE-2026-0859)
- Installation
- Known Issues
- Frequently Asked Questions
Applies to
Issue Description
Issue Description
This security update addresses multiple vulnerabilities in Windows Server 2022 23H2 Edition that could allow attackers to:
- Execute arbitrary code with elevated privileges through Windows Kernel vulnerabilities
- Bypass security features in Windows Authentication protocols
- Perform denial of service attacks against Windows DNS Server components
- Exploit memory corruption issues in Windows Graphics Device Interface (GDI)
- Access sensitive information through Windows Local Security Authority (LSA) weaknesses
Systems affected by these vulnerabilities may experience unexpected service failures, unauthorized access attempts, or potential system compromise if exploited by malicious actors.
Root Cause
Root Cause
The vulnerabilities stem from insufficient input validation in Windows kernel components, improper memory management in graphics subsystems, and inadequate authentication checks in network services. These issues exist in the base Windows Server 2022 23H2 codebase and require security patches to prevent exploitation.
Fixes Windows Kernel elevation of privilege vulnerability (CVE-2026-0847)
This update patches a critical vulnerability in the Windows Kernel that could allow an authenticated attacker to execute code with SYSTEM privileges. The fix implements additional validation checks for kernel object handling and improves memory protection mechanisms in kernel mode operations.
Resolves Windows Authentication bypass vulnerability (CVE-2026-0851)
Addresses a security weakness in Windows Authentication protocols that could allow attackers to bypass authentication mechanisms. The update strengthens credential validation processes and implements additional security checks for authentication token handling.
Patches Windows DNS Server denial of service vulnerability (CVE-2026-0853)
Fixes a vulnerability in Windows DNS Server that could be exploited to cause service disruption through specially crafted DNS queries. The update improves input validation for DNS request processing and implements resource limits to prevent service exhaustion.
Corrects Windows GDI memory corruption vulnerability (CVE-2026-0856)
Resolves memory corruption issues in Windows Graphics Device Interface that could lead to arbitrary code execution. The fix improves memory allocation handling and implements bounds checking for graphics operations to prevent buffer overflows.
Addresses Windows LSA information disclosure vulnerability (CVE-2026-0859)
Patches an information disclosure vulnerability in Windows Local Security Authority that could allow unauthorized access to sensitive authentication data. The update implements additional access controls and improves memory clearing procedures for sensitive operations.
Installation
Installation
KB5075897 is available through multiple deployment channels:
Windows Update
The update is automatically delivered to Windows Server 2022 23H2 systems with automatic updates enabled. Installation typically occurs during the next scheduled maintenance window.
Microsoft Update Catalog
Manual download is available from the Microsoft Update Catalog for offline installation. The standalone package is approximately 485 MB for x64 systems.
Windows Server Update Services (WSUS)
Enterprise environments can deploy KB5075897 through WSUS infrastructure. The update is classified as a Critical security update and should be approved for deployment to affected server groups.
System Center Configuration Manager (SCCM)
SCCM administrators can deploy this update through standard software update deployment processes. The update requires a system restart to complete installation.
Prerequisites
- Windows Server 2022 23H2 Edition (Build 25398 or later)
- Minimum 2 GB free disk space for installation
- Administrative privileges for manual installation
- Active internet connection for Windows Update delivery
Installation Details
- File Size: 485 MB (x64)
- Restart Required: Yes
- Installation Time: 15-30 minutes depending on system configuration
- Supersedes:
KB5074012(January 2026 update)
Known Issues
Known Issues
The following issues have been identified with KB5075897 installation:
Installation Failure on Domain Controllers
Some domain controllers may experience installation failure with error code 0x800f0922 when insufficient disk space is available on the system partition. Ensure at least 3 GB free space before installation.
DNS Server Service Restart Required
After installing this update, the DNS Server service may require manual restart on systems running the DNS Server role. The service may appear running but fail to respond to queries until restarted.
Restart-Service DNS in PowerShell or through Services management console.Hyper-V Virtual Machine Connectivity Issues
Some Hyper-V hosts may experience temporary network connectivity issues with virtual machines immediately after applying this update and restarting. Virtual machines may lose network connectivity for 2-3 minutes during host restart.
Windows Admin Center Connection Delays
Windows Admin Center connections to updated servers may experience increased connection times (30-60 seconds) for the first connection attempt after update installation.
Overview
KB5075897 is a critical security update released on February 10, 2026, for Windows Server 2022 23H2 Edition. This update addresses five significant security vulnerabilities and updates the operating system build to 25398.2149. The update applies to both Server Core and Desktop Experience installations of Windows Server 2022 23H2.
Security Vulnerabilities Addressed
This update resolves multiple high-priority security vulnerabilities that could potentially compromise server security and stability:
Windows Kernel Elevation of Privilege (CVE-2026-0847)
A critical vulnerability in the Windows Kernel allows authenticated attackers to execute arbitrary code with SYSTEM privileges. This vulnerability affects kernel object handling mechanisms and could lead to complete system compromise. The update implements enhanced validation checks and memory protection mechanisms to prevent exploitation.
Windows Authentication Bypass (CVE-2026-0851)
This vulnerability affects Windows Authentication protocols and could allow attackers to bypass standard authentication mechanisms. The security weakness impacts credential validation processes and authentication token handling. The fix strengthens authentication protocols and implements additional security checks.
Windows DNS Server Denial of Service (CVE-2026-0853)
A vulnerability in Windows DNS Server components could be exploited to cause service disruption through specially crafted DNS queries. This affects servers running the DNS Server role and could impact domain name resolution services. The update improves input validation and implements resource limits to prevent service exhaustion.
Windows GDI Memory Corruption (CVE-2026-0856)
Memory corruption issues in Windows Graphics Device Interface could lead to arbitrary code execution. This vulnerability affects graphics operations and memory allocation handling. The fix implements bounds checking and improves memory management for graphics operations.
Windows LSA Information Disclosure (CVE-2026-0859)
An information disclosure vulnerability in Windows Local Security Authority could allow unauthorized access to sensitive authentication data. This affects authentication data handling and memory management. The update implements additional access controls and improves memory clearing procedures.
Affected Systems
This update applies specifically to:
| Operating System | Edition | Architecture | Build Range |
|---|---|---|---|
| Windows Server 2022 | 23H2 Standard | x64 | 25398.x |
| Windows Server 2022 | 23H2 Datacenter | x64 | 25398.x |
| Windows Server 2022 | 23H2 Server Core | x64 | 25398.x |
Installation Requirements
Before installing KB5075897, ensure the following prerequisites are met:
- Operating System: Windows Server 2022 23H2 Edition (Build 25398 or later)
- Disk Space: Minimum 2 GB free space on system drive (3 GB recommended for domain controllers)
- Memory: At least 2 GB available RAM during installation
- User Account: Local Administrator or equivalent privileges
- Network: Internet connectivity for Windows Update delivery
- Dependencies: All previous monthly updates should be installed
Deployment Methods
Automatic Installation via Windows Update
Systems configured for automatic updates will receive KB5075897 during the next scheduled update cycle. The update is classified as Important and will be installed automatically unless update policies prevent automatic installation.
Manual Installation
Administrators can manually install the update using the following methods:
# Check for available updates
Get-WindowsUpdate
# Install specific KB
Install-WindowsUpdate -KBArticleID KB5075897 -AcceptAll -AutoRebootEnterprise Deployment
Enterprise environments can deploy this update through:
- WSUS: Approve for deployment to appropriate server groups
- SCCM: Create software update deployment targeting affected systems
- Microsoft Intune: Deploy through Windows Update for Business policies
- Group Policy: Configure automatic update policies for server organizational units
Post-Installation Verification
After successful installation, verify the update using these methods:
# Verify KB installation
Get-HotFix -Id KB5075897
# Check OS build version
(Get-ItemProperty "HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion").BuildLabExThe OS build should display 25398.2149 after successful installation and restart.
Impact Assessment
Installing KB5075897 provides the following security improvements:
- Eliminates five critical and important security vulnerabilities
- Strengthens Windows Authentication mechanisms
- Improves DNS Server resilience against denial of service attacks
- Enhances kernel security and privilege escalation protection
- Reduces information disclosure risks in authentication subsystems
The update maintains compatibility with existing server roles and applications while providing essential security enhancements for Windows Server 2022 23H2 environments.
Frequently Asked Questions
What does KB5075897 resolve?
Which systems require KB5075897?
Is KB5075897 a security update?
What are the prerequisites for KB5075897?
Are there known issues with KB5075897?
References (3)
About the Author
Discussion
Share your thoughts and insights
You must be logged in to comment.
Related KB Articles

KB5078737 — March 2026 Security Hotpatch for Windows Server 2022
KB5078737 is a March 2026 security hotpatch update for Windows Server 2022 that addresses multiple security vulnerabilities without requiring a system restart, updating the OS build to 20348.4830.

KB5078766 — March 2026 Security Update for Windows Server 2022
KB5078766 is a March 2026 security update that addresses multiple vulnerabilities in Windows Server 2022, including critical remote code execution flaws and privilege escalation issues affecting server infrastructure.

KB5078734 — March 2026 Security Update for Windows Server 2022 23H2
KB5078734 is a March 2026 security update that addresses multiple vulnerabilities in Windows Server 2022 23H2, including critical remote code execution flaws and privilege escalation issues affecting Server Core installations.

KB5078774 — March 2026 Monthly Rollup for Windows Server 2012 R2
KB5078774 is a March 2026 monthly rollup update for Windows Server 2012 R2 that includes security fixes, reliability improvements, and compatibility updates for legacy server environments.