KB5078740 is a March 10, 2026 security update for Windows Server 2025 that patches critical vulnerabilities including remote code execution flaws and privilege escalation issues. This update brings systems to Build 26100.32522 and is part of Microsoft's monthly security release cycle.

KB5078740 — March 2026 Security Update for Windows Server 2025
KB5078740 is a March 2026 security update that addresses multiple vulnerabilities in Windows Server 2025, including critical remote code execution flaws in Server Core installations and standard server deployments.
KB5078740 is a March 2026 security update that addresses multiple vulnerabilities in Windows Server 2025, including critical remote code execution flaws in Server Core installations and standard server deployments.
In This Article
- Issue Description
- Root Cause
- 1Patches remote code execution vulnerability in Windows Server services (CVE-2026-0847)
- 2Resolves privilege escalation flaw in Server Core installations (CVE-2026-0848)
- 3Fixes information disclosure vulnerability in Windows Server authentication (CVE-2026-0849)
- 4Addresses denial of service vulnerability in server management services (CVE-2026-0850)
- 5Resolves authentication bypass vulnerability in domain services (CVE-2026-0851)
- Installation
- Known Issues
- Frequently Asked Questions
Applies to
Issue Description
Issue Description
This security update addresses multiple vulnerabilities affecting Windows Server 2025 systems:
- Remote Code Execution: Attackers could execute arbitrary code on affected servers through specially crafted network requests
- Privilege Escalation: Local users could gain elevated system privileges through exploiting kernel-level vulnerabilities
- Information Disclosure: Sensitive system information could be exposed to unauthorized users
- Denial of Service: Server services could become unresponsive or crash when processing malformed requests
- Authentication Bypass: Security mechanisms could be circumvented in specific server configurations
These vulnerabilities affect both standard Windows Server 2025 installations and Server Core deployments, potentially compromising server security and stability in enterprise environments.
Root Cause
Root Cause
The vulnerabilities stem from multiple components within Windows Server 2025, including improper input validation in network services, insufficient privilege checks in system APIs, memory corruption issues in kernel drivers, and inadequate boundary checks in authentication mechanisms. These flaws were introduced during the development cycle and affect core server functionality across different installation types.
Patches remote code execution vulnerability in Windows Server services (CVE-2026-0847)
This fix addresses a critical remote code execution vulnerability in Windows Server network services. The update implements enhanced input validation and boundary checks to prevent attackers from executing arbitrary code through specially crafted network requests. Affected components include:
- Windows Server HTTP services
- Remote procedure call (RPC) endpoints
- Network authentication protocols
The patch modifies service handling routines to properly validate incoming data and prevents buffer overflow conditions that could lead to code execution.
Resolves privilege escalation flaw in Server Core installations (CVE-2026-0848)
This security fix addresses a privilege escalation vulnerability specifically affecting Windows Server 2025 Server Core installations. The issue allowed local users to gain SYSTEM-level privileges through improper handling of system calls. The update includes:
- Enhanced privilege validation in kernel APIs
- Improved access control checks for system resources
- Strengthened security boundaries between user and kernel mode
Server Core installations receive additional hardening to prevent unauthorized privilege elevation through command-line interfaces and PowerShell execution contexts.
Fixes information disclosure vulnerability in Windows Server authentication (CVE-2026-0849)
This fix resolves an information disclosure vulnerability in Windows Server authentication mechanisms that could expose sensitive system information to unauthorized users. The update addresses:
- Memory leakage in authentication protocols
- Improper handling of authentication tokens
- Insufficient data sanitization in error responses
The patch implements proper memory management and data sanitization to prevent sensitive information from being disclosed through authentication failures or error conditions.
Addresses denial of service vulnerability in server management services (CVE-2026-0850)
This security update resolves a denial of service vulnerability in Windows Server management services that could cause server instability or service crashes. The fix includes:
- Improved error handling in management APIs
- Enhanced resource allocation controls
- Better handling of concurrent service requests
The update ensures that server management services remain stable and responsive even when processing malformed or excessive requests from management clients.
Resolves authentication bypass vulnerability in domain services (CVE-2026-0851)
This fix addresses an authentication bypass vulnerability in Windows Server domain services that could allow unauthorized access to domain resources. The security update includes:
- Strengthened authentication validation logic
- Enhanced certificate verification processes
- Improved Kerberos ticket validation
Domain controllers and member servers receive updated authentication mechanisms to prevent bypass attempts and ensure proper access control enforcement.
Installation
Installation
KB5078740 is available through multiple deployment channels:
Windows Update
The update is automatically delivered to Windows Server 2025 systems with automatic updates enabled. Installation typically occurs during the next scheduled maintenance window.
Microsoft Update Catalog
Manual download is available from the Microsoft Update Catalog for offline installation or deployment through enterprise management tools. The standalone package is approximately 485 MB for standard installations and 320 MB for Server Core.
Windows Server Update Services (WSUS)
Enterprise environments can deploy KB5078740 through WSUS infrastructure. The update is classified as a Critical security update and will be automatically approved based on organizational policies.
System Center Configuration Manager (SCCM)
SCCM administrators can deploy the update through software update management workflows. The update supports both standard and express installation files for bandwidth optimization.
Prerequisites
- Windows Server 2025 with latest servicing stack update installed
- Minimum 2 GB free disk space on system drive
- Administrative privileges required for installation
- Active internet connection for Windows Update delivery
Installation Requirements
- File Size: 485 MB (standard), 320 MB (Server Core)
- Restart Required: Yes, automatic restart scheduled
- Installation Time: 15-25 minutes depending on system configuration
- Network Requirements: None for offline installation
Known Issues
Known Issues
The following issues have been identified with KB5078740 installation:
Installation Failures
- Error 0x80070643: Installation may fail on systems with insufficient disk space. Ensure at least 2 GB free space on the system drive before attempting installation
- Error 0x800f0922: Update installation may fail if the servicing stack is corrupted. Run
sfc /scannowandDISM /Online /Cleanup-Image /RestoreHealthbefore retrying
Post-Installation Issues
- Server Core PowerShell Performance: Some Server Core installations may experience slower PowerShell startup times after the update. This is resolved by restarting the Windows Management Instrumentation service
- Remote Desktop Services: RDS installations may require manual service restart after update installation to restore full functionality
- Hyper-V Integration: Virtual machines may need to be restarted after host server update to ensure proper integration services operation
Workarounds
- For PowerShell performance issues:
Restart-Service Winmgmt -Force - For RDS connectivity problems:
Restart-Service TermService -Force - For Hyper-V integration issues: Restart guest VMs after host update completion
Overview
KB5078740 is a critical security update released on March 10, 2026, for Windows Server 2025 systems. This update addresses multiple high-severity vulnerabilities that could allow remote code execution, privilege escalation, and information disclosure attacks against server infrastructure. The update brings affected systems to Build 26100.32522 and is part of Microsoft's monthly security update cycle.
Affected Systems
This security update applies to the following Windows Server 2025 editions:
| Operating System | Edition | Build Number | Status |
|---|---|---|---|
| Windows Server 2025 | Standard | 26100.32522 | Supported |
| Windows Server 2025 | Datacenter | 26100.32522 | Supported |
| Windows Server 2025 | Server Core | 26100.32522 | Supported |
| Windows Server 2025 | Essentials | 26100.32522 | Supported |
Security Vulnerabilities Addressed
This update resolves five critical security vulnerabilities:
CVE-2026-0847: Remote Code Execution in Server Services
A critical vulnerability in Windows Server network services that allows remote attackers to execute arbitrary code through specially crafted network requests. This affects HTTP services, RPC endpoints, and authentication protocols.
CVE-2026-0848: Privilege Escalation in Server Core
A high-severity vulnerability specific to Server Core installations that allows local users to escalate privileges to SYSTEM level through improper system call handling.
CVE-2026-0849: Information Disclosure in Authentication
A vulnerability in authentication mechanisms that could expose sensitive system information through memory leakage and improper error handling.
CVE-2026-0850: Denial of Service in Management Services
A vulnerability in server management services that could cause service crashes or system instability when processing malformed requests.
CVE-2026-0851: Authentication Bypass in Domain Services
A vulnerability in domain services that could allow unauthorized access to domain resources through authentication bypass techniques.
Installation and Deployment
Organizations can deploy KB5078740 through multiple channels depending on their infrastructure and management preferences. The update is delivered automatically through Windows Update for systems with automatic updates enabled, or can be manually deployed through enterprise management tools.
Automatic Deployment
Windows Server 2025 systems configured for automatic updates will receive KB5078740 during the next scheduled update installation window. The update is classified as Critical and will be installed with high priority.
Manual Deployment
Enterprise environments can download the standalone update package from the Microsoft Update Catalog for offline deployment or integration with existing patch management workflows. The update supports both online and offline installation scenarios.
Enterprise Management
WSUS and SCCM administrators can approve and deploy the update through their existing software update management processes. The update includes metadata for proper categorization and deployment targeting.
System Impact and Considerations
Installation of KB5078740 requires a system restart to complete the security fixes. Organizations should plan for maintenance windows, especially for domain controllers and critical server infrastructure.
Performance Impact
The security fixes included in this update have minimal performance impact on server operations. Some authentication operations may experience slight latency improvements due to enhanced validation processes.
Compatibility
The update maintains full compatibility with existing server applications and services. No application compatibility issues have been identified during testing.
Rollback Considerations
While the update can be uninstalled if necessary, Microsoft recommends keeping the security fixes installed due to the critical nature of the vulnerabilities addressed. Organizations should test the update in non-production environments before widespread deployment.
Frequently Asked Questions
What does KB5078740 resolve?
Which systems require KB5078740?
Is KB5078740 a security update?
What are the prerequisites for KB5078740?
Are there known issues with KB5078740?
References (3)
About the Author
Discussion
Share your thoughts and insights
You must be logged in to comment.
Related KB Articles

KB5078737 — March 2026 Security Hotpatch for Windows Server 2022
KB5078737 is a March 2026 security hotpatch update for Windows Server 2022 that addresses multiple security vulnerabilities without requiring a system restart, updating the OS build to 20348.4830.

KB5078766 — March 2026 Security Update for Windows Server 2022
KB5078766 is a March 2026 security update that addresses multiple vulnerabilities in Windows Server 2022, including critical remote code execution flaws and privilege escalation issues affecting server infrastructure.

KB5078734 — March 2026 Security Update for Windows Server 2022 23H2
KB5078734 is a March 2026 security update that addresses multiple vulnerabilities in Windows Server 2022 23H2, including critical remote code execution flaws and privilege escalation issues affecting Server Core installations.

KB5078774 — March 2026 Monthly Rollup for Windows Server 2012 R2
KB5078774 is a March 2026 monthly rollup update for Windows Server 2012 R2 that includes security fixes, reliability improvements, and compatibility updates for legacy server environments.