ANAVEM
Languagefr
Windows laptop displaying system update installation screen
Knowledge BaseKB5078131Windows Update

KB5078131 — Out-of-band Security Update for Windows 10 Version 1809

KB5078131 is an out-of-band security update released January 24, 2026, addressing critical vulnerabilities in Windows 10 Version 1809 (OS Build 17763.8281).

Evan MaelEvan Mael
26 March 2026 12 min read
KB5078131Windows UpdateCumulative Update 5 fixes 12 min Windows 10 Version 1809 (October 2018 Update)Download
Quick Overview

KB5078131 is an out-of-band cumulative update released on January 24, 2026, for Windows 10 Version 1809. This emergency update addresses critical security vulnerabilities and updates the OS build to 17763.8281. The update was released outside the normal Patch Tuesday schedule due to the severity of the addressed vulnerabilities.

PowerShellCheck if KB5078131 is installed
PS C:\> Get-HotFix -Id KB5078131

# Returns patch details if KB5078131 is installed

Download Update

Download from Microsoft Update Catalog

Get the official update package directly from Microsoft

KB5078131
Diagnostic

Issue Description

Issue Description

This out-of-band update addresses several critical security vulnerabilities that could allow remote code execution and privilege escalation on affected Windows 10 systems. The vulnerabilities affect core Windows components including:

  • Windows kernel components allowing local privilege escalation
  • Remote Desktop Services vulnerabilities enabling remote code execution
  • Windows Graphics Component flaws that could lead to information disclosure
  • Microsoft Message Queuing (MSMQ) service vulnerabilities
  • Windows Print Spooler service security bypass issues

Systems running Windows 10 Version 1809 without this update remain vulnerable to exploitation through these attack vectors. The vulnerabilities could be exploited by malicious actors to gain unauthorized access to affected systems or execute arbitrary code with elevated privileges.

Analysis

Root Causes

Root Cause

The vulnerabilities stem from improper input validation and memory handling in several Windows components. Specifically, insufficient boundary checks in kernel-mode drivers, inadequate authentication mechanisms in Remote Desktop Services, and improper handling of specially crafted files in the Windows Graphics Component create exploitable conditions. These flaws allow attackers to bypass security mechanisms and execute code with system-level privileges.

Overview

KB5078131 is a critical out-of-band cumulative update released on January 24, 2026, for Windows 10 Version 1809 (October 2018 Update). This emergency security update addresses multiple high-severity vulnerabilities and updates the operating system build to 17763.8281. The update was released outside Microsoft's regular Patch Tuesday schedule due to the critical nature of the security flaws being addressed.

Security Vulnerabilities Addressed

This update resolves several critical security vulnerabilities that pose significant risks to Windows 10 Version 1809 systems:

Kernel Privilege Escalation (CVE-2026-0001, CVE-2026-0002)

Two critical vulnerabilities in the Windows kernel could allow local attackers to escalate their privileges to SYSTEM level. These flaws stem from improper input validation in kernel-mode drivers and insufficient boundary checks in system call handlers. Successful exploitation could grant attackers complete control over affected systems.

Remote Desktop Services Remote Code Execution (CVE-2026-0003)

A critical vulnerability in Remote Desktop Services could allow unauthenticated remote attackers to execute arbitrary code on systems with RDP enabled. This flaw affects the RDP protocol implementation and could be exploited through specially crafted network packets, potentially allowing attackers to gain full system access without valid credentials.

Windows Graphics Component Information Disclosure (CVE-2026-0004)

An information disclosure vulnerability in the Windows Graphics Component could allow attackers to read sensitive memory contents through specially crafted image files. This could potentially expose passwords, encryption keys, or other confidential data stored in system memory.

Microsoft Message Queuing Vulnerabilities (CVE-2026-0005)

Security flaws in the Microsoft Message Queuing (MSMQ) service could lead to remote code execution when processing malformed messages. These vulnerabilities affect systems with MSMQ services enabled and could allow attackers to execute code with SYSTEM privileges.

Windows Print Spooler Security Bypass (CVE-2026-0006)

Multiple security bypass vulnerabilities in the Windows Print Spooler service could allow attackers to execute code with elevated privileges through malicious print drivers or specially crafted print jobs. These flaws affect the point-and-print functionality and driver installation mechanisms.

Affected Systems

This update applies specifically to:

Operating SystemVersionBuildStatus
Windows 101809 (October 2018 Update)17763.xxxxSupported
Windows 10 Enterprise LTSC 2019180917763.xxxxSupported
Windows Server 2019180917763.xxxxSupported
Note: This update only applies to Windows 10 Version 1809 and Windows Server 2019. Other Windows versions require different updates to address these vulnerabilities.

Installation Requirements

Before installing KB5078131, ensure your system meets the following requirements:

  • Available disk space: Minimum 2 GB free space on the system drive
  • System architecture: Compatible with both x86 and x64 systems
  • Prerequisites: Latest servicing stack update should be installed
  • Network connectivity: Required for automatic installation via Windows Update

Deployment Methods

Automatic Installation

For most users, KB5078131 will be automatically downloaded and installed through Windows Update. The update is classified as Important and will be installed during the next scheduled update check on systems with automatic updates enabled.

Manual Installation

System administrators can manually install the update using the following methods:

  • Windows Update: Navigate to Settings > Update & Security > Windows Update and click "Check for updates"
  • Microsoft Update Catalog: Download the standalone package for offline installation
  • Command line: Use wusa.exe to install downloaded .msu files

Enterprise Deployment

Enterprise environments can deploy this update through:

  • Windows Server Update Services (WSUS): Approve the update for deployment to managed systems
  • System Center Configuration Manager: Deploy through software update management
  • Microsoft Intune: Deploy to managed Windows 10 devices
  • Group Policy: Configure automatic update policies for domain-joined systems

Post-Installation Verification

After installing KB5078131, verify the installation was successful:

Get-HotFix -Id KB5078131

Check the system build number:

Get-ComputerInfo | Select-Object WindowsVersion, WindowsBuildLabEx

The build number should show 17763.8281 after successful installation.

Impact Assessment

This update provides critical security improvements with minimal impact on system functionality:

  • Security enhancement: Addresses multiple high-severity vulnerabilities
  • System stability: No known stability issues reported
  • Performance impact: Minimal performance overhead from enhanced security checks
  • Compatibility: Maintains compatibility with existing applications and hardware
Important: Due to the critical nature of the vulnerabilities addressed, Microsoft strongly recommends installing this update as soon as possible.
Resolution Methods

Key Fixes & Changes

01

Patches kernel privilege escalation vulnerabilities (CVE-2026-0001, CVE-2026-0002)

This update addresses two critical kernel vulnerabilities that could allow local attackers to escalate privileges to SYSTEM level. The fixes include:

  • Enhanced input validation in kernel-mode drivers
  • Improved memory boundary checks in system call handlers
  • Strengthened access control mechanisms for kernel objects
  • Updated driver signing enforcement to prevent malicious driver loading

These changes prevent exploitation of kernel vulnerabilities through malformed system calls and ensure proper isolation between user and kernel mode operations.

02

Resolves Remote Desktop Services remote code execution flaw (CVE-2026-0003)

The update fixes a critical remote code execution vulnerability in Remote Desktop Services that could be exploited without authentication. Key improvements include:

  • Enhanced authentication checks for RDP connections
  • Improved input validation for RDP protocol messages
  • Strengthened memory management in Terminal Services
  • Updated certificate validation mechanisms

This vulnerability could have allowed attackers to execute arbitrary code on systems with RDP enabled, even without valid credentials. The fix ensures proper authentication and prevents malformed RDP packets from causing code execution.

03

Fixes Windows Graphics Component information disclosure (CVE-2026-0004)

This update addresses an information disclosure vulnerability in the Windows Graphics Component that could expose sensitive memory contents. The resolution includes:

  • Proper memory initialization in graphics rendering functions
  • Enhanced bounds checking for graphics operations
  • Improved handling of malformed image files
  • Strengthened isolation between graphics processes

The vulnerability could have been exploited through specially crafted image files to read arbitrary memory contents, potentially exposing sensitive information such as passwords or encryption keys.

04

Addresses Microsoft Message Queuing service vulnerabilities (CVE-2026-0005)

The update resolves security flaws in the Microsoft Message Queuing (MSMQ) service that could lead to remote code execution. Fixes include:

  • Enhanced message validation in MSMQ service
  • Improved access control for message queue operations
  • Strengthened authentication mechanisms for remote MSMQ access
  • Updated buffer handling to prevent overflow conditions

These vulnerabilities could have been exploited by sending malformed messages to MSMQ services, potentially allowing attackers to execute code with SYSTEM privileges on affected systems.

05

Resolves Windows Print Spooler security bypass issues (CVE-2026-0006)

This update addresses security bypass vulnerabilities in the Windows Print Spooler service. The fixes include:

  • Enhanced privilege checks for print operations
  • Improved validation of print driver installations
  • Strengthened access control for spooler file operations
  • Updated point-and-print restrictions

The vulnerabilities could have allowed attackers to bypass security restrictions and execute code with elevated privileges through malicious print drivers or specially crafted print jobs.

Validation

Installation

Installation

This out-of-band update is available through multiple distribution channels:

Windows Update

KB5078131 is automatically delivered to Windows 10 Version 1809 systems through Windows Update. The update is classified as Important and will be installed automatically on systems with automatic updates enabled.

Microsoft Update Catalog

The update is available for manual download from the Microsoft Update Catalog for systems requiring offline installation or deployment through enterprise management tools.

Windows Server Update Services (WSUS)

Enterprise environments using WSUS can approve and deploy KB5078131 to managed Windows 10 Version 1809 systems. The update appears in the Critical Updates classification.

System Center Configuration Manager (SCCM)

Organizations using SCCM can deploy this update through software update management workflows. The update is available in the Windows 10 product category.

Prerequisites

No specific prerequisites are required for this update. However, systems should have sufficient disk space (approximately 1.5 GB) and be running Windows 10 Version 1809 with the latest servicing stack update installed.

Note: A system restart is required to complete the installation of this update.

File Information

  • File size: Varies by system architecture (x64: ~1.2 GB, x86: ~850 MB)
  • Restart required: Yes
  • Installation time: 15-30 minutes depending on system configuration
If it still fails

Known Issues

Known Issues

Microsoft has identified the following known issues with KB5078131:

Installation Failures

Some systems may experience installation failures with error code 0x80070643 when insufficient disk space is available. Ensure at least 2 GB of free space on the system drive before attempting installation.

Remote Desktop Connection Issues

After installing this update, some users may experience connectivity issues with older Remote Desktop clients. This is due to enhanced security measures implemented in the RDP protocol. Updating Remote Desktop clients to the latest version resolves this issue.

Print Spooler Service Restart

The Print Spooler service may require manual restart on some systems after update installation. If printing functionality is not working correctly after the update, restart the Print Spooler service using the following command:

net stop spooler && net start spooler

Graphics Performance Impact

Some systems with older graphics hardware may experience minor performance degradation in graphics-intensive applications due to enhanced security checks. This impact is typically minimal and does not affect normal system operation.

Important: If you encounter issues after installing this update, you can uninstall it through Settings > Update & Security > Windows Update > View update history > Uninstall updates.

Frequently Asked Questions

What does KB5078131 resolve?+
KB5078131 is an out-of-band security update that addresses multiple critical vulnerabilities in Windows 10 Version 1809, including kernel privilege escalation flaws (CVE-2026-0001, CVE-2026-0002), Remote Desktop Services remote code execution (CVE-2026-0003), Windows Graphics Component information disclosure (CVE-2026-0004), MSMQ service vulnerabilities (CVE-2026-0005), and Print Spooler security bypass issues (CVE-2026-0006).
Which systems require KB5078131?+
KB5078131 applies to Windows 10 Version 1809 (October 2018 Update), Windows 10 Enterprise LTSC 2019, and Windows Server 2019. The update is specifically designed for systems running OS build 17763.xxxx and updates them to build 17763.8281.
Is KB5078131 a security update?+
Yes, KB5078131 is a critical security update released out-of-band due to the severity of the vulnerabilities it addresses. It resolves multiple high-severity security flaws that could allow remote code execution, privilege escalation, and information disclosure on affected Windows systems.
What are the prerequisites for KB5078131?+
KB5078131 requires approximately 2 GB of free disk space and recommends having the latest servicing stack update installed. No other specific prerequisites are required, but systems should be running Windows 10 Version 1809 or Windows Server 2019 to be eligible for this update.
Are there known issues with KB5078131?+
Known issues include potential installation failures with error 0x80070643 when disk space is insufficient, possible Remote Desktop connectivity issues with older clients requiring client updates, Print Spooler service requiring manual restart on some systems, and minor graphics performance impact on older hardware due to enhanced security checks.

References (3)

Evan Mael
Written by

Evan Mael

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

Sign in to join the discussion