Reference
Server room with Windows servers displaying update installation status on monitoring screens
KB5075943Windows ServerWindows Server

KB5075943 — February 2026 Security Hotpatch for Windows Server 2022

KB5075943 is a February 2026 security hotpatch update for Windows Server 2022 that addresses critical vulnerabilities and security issues without requiring a system restart.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
11 Mar 202612 min read0 views

KB5075943 is a February 2026 security hotpatch update for Windows Server 2022 that addresses critical vulnerabilities and security issues without requiring a system restart.

Overview

KB5075943 is a February 10, 2026 security hotpatch update for Windows Server 2022 that updates the OS build to 20348.4711. This hotpatch addresses multiple security vulnerabilities and can be installed without requiring a system restart, minimizing downtime for production servers.

Applies to

Windows Server 2022Windows Server 2022 (Server Core installation)

Issue Description

Issue Description

This hotpatch update addresses several security vulnerabilities and issues affecting Windows Server 2022 systems:

  • Remote code execution vulnerabilities in Windows Server components
  • Elevation of privilege vulnerabilities in Windows kernel
  • Information disclosure vulnerabilities in Windows networking stack
  • Security bypass vulnerabilities in Windows authentication mechanisms
  • Denial of service vulnerabilities in Windows Server services

Without this update, Windows Server 2022 systems remain vulnerable to potential security exploits that could compromise server integrity, confidentiality, and availability.

Root Cause

Root Cause

The vulnerabilities addressed by KB5075943 stem from insufficient input validation, improper memory handling, and inadequate security checks in various Windows Server 2022 components. These security flaws could allow attackers to execute arbitrary code, escalate privileges, or bypass security mechanisms on affected systems.

1

Patches remote code execution vulnerabilities in Windows Server components

This hotpatch addresses critical remote code execution vulnerabilities in Windows Server 2022 core components. The update strengthens input validation and memory handling mechanisms to prevent exploitation of buffer overflow and memory corruption vulnerabilities. These fixes apply to Windows Server services, networking components, and system libraries that could be targeted by remote attackers.

2

Resolves elevation of privilege vulnerabilities in Windows kernel

The update patches several elevation of privilege vulnerabilities in the Windows kernel that could allow local attackers to gain SYSTEM-level access. These fixes include improved privilege checks, enhanced security boundaries, and corrected access control mechanisms in kernel-mode drivers and system services.

3

Fixes information disclosure vulnerabilities in networking stack

This hotpatch addresses information disclosure vulnerabilities in the Windows networking stack that could allow attackers to access sensitive information from server memory. The fixes include improved memory initialization, enhanced data sanitization, and strengthened network protocol handling to prevent information leakage.

4

Strengthens Windows authentication security mechanisms

The update resolves security bypass vulnerabilities in Windows authentication mechanisms, including improvements to Kerberos authentication, NTLM protocol handling, and certificate validation processes. These fixes prevent attackers from bypassing authentication controls and gaining unauthorized access to server resources.

5

Addresses denial of service vulnerabilities in server services

This hotpatch fixes denial of service vulnerabilities in various Windows Server services that could be exploited to cause system instability or service unavailability. The fixes include improved resource management, enhanced error handling, and strengthened input validation in server components.

Installation

Installation

KB5075943 is delivered automatically through Windows Update for Windows Server 2022 systems with automatic updates enabled. The hotpatch is also available through the following channels:

  • Windows Update: Automatic delivery begins February 10, 2026
  • Microsoft Update Catalog: Available for manual download and deployment
  • Windows Server Update Services (WSUS): Available for enterprise deployment
  • Microsoft Endpoint Configuration Manager: Distributed through software update management
  • Azure Update Management: Available for Azure-hosted Windows Server 2022 VMs
Note: This is a hotpatch update that does not require a system restart. The update applies immediately after installation without interrupting running services.

Prerequisites:

  • Windows Server 2022 with latest servicing stack update installed
  • Minimum 500 MB free disk space for installation
  • Administrative privileges required for installation

File Size: Approximately 45 MB
Restart Required: No (hotpatch technology)

Known Issues

Known Issues

Microsoft has identified the following known issues with KB5075943:

  • Hyper-V Integration Services: Some third-party Hyper-V integration services may require restart after hotpatch installation to function properly
  • Custom kernel drivers: Systems with unsigned or custom kernel drivers may experience compatibility issues. Ensure all drivers are properly signed and compatible
  • Windows Server Backup: Backup operations in progress during hotpatch installation may need to be restarted
Important: While this hotpatch does not require a restart, some security features may not be fully active until the next scheduled system restart.

Workarounds:

  • For Hyper-V integration issues, restart the affected virtual machines after hotpatch installation
  • Update or remove incompatible kernel drivers before installing the hotpatch
  • Schedule backup operations outside of maintenance windows when hotpatches are applied

Overview

KB5075943 is a critical security hotpatch update released on February 10, 2026, for Windows Server 2022 systems. This update advances the operating system build to 20348.4711 and addresses multiple high-priority security vulnerabilities without requiring a system restart. The hotpatch technology allows production servers to receive critical security fixes while maintaining continuous operation and minimizing service disruption.

Security Vulnerabilities Addressed

This hotpatch update resolves several categories of security vulnerabilities that could potentially compromise Windows Server 2022 systems:

Remote Code Execution Vulnerabilities

The update patches critical remote code execution flaws in Windows Server components that could allow attackers to execute arbitrary code on target systems. These vulnerabilities affect core server services, networking components, and system libraries. The fixes implement enhanced input validation, improved memory handling, and strengthened security boundaries to prevent exploitation.

Privilege Escalation Issues

Several elevation of privilege vulnerabilities in the Windows kernel are addressed by this hotpatch. These flaws could allow local attackers to gain SYSTEM-level access and compromise server security. The fixes include improved privilege checks, enhanced access control mechanisms, and corrected security boundaries in kernel-mode components.

Information Disclosure Vulnerabilities

The update resolves information disclosure vulnerabilities in the Windows networking stack that could expose sensitive server information to unauthorized parties. These fixes implement proper memory initialization, enhanced data sanitization, and improved network protocol handling to prevent information leakage.

Authentication Security Enhancements

Security bypass vulnerabilities in Windows authentication mechanisms are patched, including improvements to Kerberos authentication, NTLM protocol handling, and certificate validation processes. These enhancements prevent attackers from bypassing authentication controls and gaining unauthorized access to server resources.

Affected Systems

KB5075943 applies to the following Windows Server 2022 configurations:

Operating SystemEditionArchitectureBuild
Windows Server 2022Standard, Datacenterx6420348.x
Windows Server 2022Server Corex6420348.x
Windows Server 2022Azure Editionx6420348.x

Hotpatch Technology Benefits

This update utilizes Microsoft's hotpatch technology, which provides several advantages for production server environments:

  • Zero Downtime: Security fixes are applied without requiring a system restart
  • Continuous Operation: Server services remain available during update installation
  • Reduced Maintenance Windows: Eliminates the need for scheduled downtime for security updates
  • Improved Security Posture: Faster deployment of critical security fixes

Installation Requirements

Before installing KB5075943, ensure the following requirements are met:

System Prerequisites

  • Windows Server 2022 with current servicing stack update
  • Administrative privileges for installation
  • Minimum 500 MB available disk space
  • Active Windows Update service

Network Requirements

  • Internet connectivity for Windows Update (if using automatic updates)
  • Access to WSUS server (for enterprise deployments)
  • Firewall rules allowing Windows Update traffic

Deployment Methods

Organizations can deploy KB5075943 using various methods depending on their infrastructure and requirements:

Automatic Windows Update

The hotpatch is automatically delivered to Windows Server 2022 systems with automatic updates enabled. Installation begins immediately upon download completion.

Manual Installation

Download the standalone package from Microsoft Update Catalog for manual installation using the following command:

wusa.exe KB5075943-x64.msu /quiet /norestart

Enterprise Deployment

Use Windows Server Update Services (WSUS) or Microsoft Endpoint Configuration Manager to deploy the hotpatch across multiple servers in a controlled manner.

Verification and Monitoring

After installation, verify the hotpatch was applied successfully:

Get-HotFix -Id KB5075943

Check the current OS build number:

[System.Environment]::OSVersion.Version

The build number should show 20348.4711 after successful installation.

Security Impact Assessment

The vulnerabilities addressed by KB5075943 are classified as critical and important severity levels. Without this update, Windows Server 2022 systems remain vulnerable to:

  • Remote code execution attacks targeting server components
  • Local privilege escalation attempts
  • Information disclosure through network protocols
  • Authentication bypass techniques
  • Denial of service attacks against server services

Organizations should prioritize the deployment of this hotpatch to maintain security compliance and protect against known vulnerabilities.

Frequently Asked Questions

What does KB5075943 resolve?
KB5075943 is a security hotpatch that addresses multiple critical vulnerabilities in Windows Server 2022, including remote code execution, privilege escalation, information disclosure, authentication bypass, and denial of service vulnerabilities. It updates the OS build to 20348.4711.
Which systems require KB5075943?
KB5075943 applies to all Windows Server 2022 editions including Standard, Datacenter, Server Core, and Azure Edition running on x64 architecture. Both physical and virtual server deployments are affected.
Is KB5075943 a security update?
Yes, KB5075943 is classified as a critical security hotpatch update that addresses multiple high-severity vulnerabilities. It is recommended for immediate deployment to maintain server security and compliance.
What are the prerequisites for KB5075943?
Prerequisites include Windows Server 2022 with the latest servicing stack update, administrative privileges, minimum 500 MB free disk space, and an active Windows Update service. No specific prior updates are required.
Are there known issues with KB5075943?
Known issues include potential compatibility problems with third-party Hyper-V integration services, unsigned kernel drivers, and Windows Server Backup operations in progress during installation. These issues have documented workarounds.

References (3)

About the Author

Emanuel DE ALMEIDA

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...