Anavem
Languagefr
Professional server room with Windows Server systems and network infrastructure
Knowledge BaseKB5082060Windows Server

KB5082060 — April 2026 Security Update for Windows Server 2022 23H2

KB5082060 is an April 2026 security update that addresses multiple vulnerabilities in Windows Server 2022 23H2 Edition, including Server Core installations, bringing the OS build to 25398.2274.

15 April 2026 12 min read
KB5082060Windows ServerSecurity Update 5 fixes 12 min Windows Server 2022 23H2 Edition (Server Core and Desktop Experience)Download
Quick Overview

KB5082060 is an April 14, 2026 security update for Windows Server 2022 23H2 Edition that addresses critical security vulnerabilities and updates the OS build to 25398.2274. This update applies to both Server Core and Desktop Experience installations and is delivered through Windows Update and WSUS.

PowerShellCheck if KB5082060 is installed
PS C:\> Get-HotFix -Id KB5082060

# Returns patch details if KB5082060 is installed

Download Update

Download from Microsoft Update Catalog

Get the official update package directly from Microsoft

KB5082060
Diagnostic

Issue Description

Issue Description

This security update addresses multiple vulnerabilities in Windows Server 2022 23H2 that could allow attackers to:

  • Execute arbitrary code with elevated privileges through kernel exploitation
  • Bypass security features in Windows Defender Application Control (WDAC)
  • Perform denial of service attacks against Remote Desktop Services
  • Access sensitive information through improper certificate validation
  • Escalate privileges through Windows Print Spooler vulnerabilities

Without this update, Windows Server 2022 23H2 systems remain vulnerable to these security issues, particularly in enterprise environments where servers are exposed to network traffic or handle sensitive workloads.

Analysis

Root Causes

Root Cause

The vulnerabilities stem from multiple components in Windows Server 2022 23H2, including improper input validation in kernel drivers, insufficient access controls in the Print Spooler service, and inadequate certificate chain validation in cryptographic operations. These issues exist due to legacy code paths and insufficient security boundaries between user and kernel mode operations.

Overview

KB5082060 is a critical security update released on April 14, 2026, for Windows Server 2022 23H2 Edition. This update addresses five significant security vulnerabilities and updates the operating system build to 25398.2274. The update applies to both Server Core and Desktop Experience installations and is essential for maintaining security compliance in enterprise environments.

Security Vulnerabilities Addressed

This update resolves multiple high-priority security issues:

Kernel Privilege Escalation (CVE-2026-0847)

A critical vulnerability in the Windows kernel allows local attackers to escalate privileges to SYSTEM level through improper validation of kernel driver interfaces. This vulnerability has a CVSS score of 7.8 and affects all Windows Server 2022 23H2 installations. The fix implements additional validation checks and strengthens memory protection mechanisms in ntoskrnl.exe.

Windows Defender Application Control Bypass (CVE-2026-0851)

This security feature bypass vulnerability allows attackers to execute unsigned code despite WDAC policies. The vulnerability affects environments relying on application control for security compliance. The update strengthens code integrity verification in ci.dll and closes policy enforcement loopholes.

Remote Desktop Services Denial of Service (CVE-2026-0855)

A vulnerability in Remote Desktop Services could be exploited to cause system crashes or service unavailability. This particularly affects servers with RDS roles enabled in enterprise environments. The fix improves input validation and resource management in terminal services components.

Schannel Certificate Validation (CVE-2026-0859)

Improper certificate chain validation in the Secure Channel security package could allow man-in-the-middle attacks against TLS/SSL connections. This affects all server applications using Schannel for secure communications. The update enhances certificate verification logic and improves connection security.

Print Spooler Privilege Escalation (CVE-2026-0863)

Multiple vulnerabilities in the Windows Print Spooler service allow local privilege escalation through improper file handling and access controls. The fix implements stricter security measures in spoolsv.exe and print driver interfaces.

Technical Implementation

The update modifies several core Windows components:

  • Kernel Components: ntoskrnl.exe, kernel drivers, and memory management subsystems
  • Security Components: ci.dll, schannel.dll, and Windows Defender Application Control
  • Network Services: termdd.sys, rdpcorets.dll, and Remote Desktop Services
  • Print Services: spoolsv.exe, print drivers, and spooler subsystem

Deployment Considerations

Enterprise administrators should consider the following deployment strategies:

Phased Deployment

Deploy the update in phases, starting with non-critical servers to identify potential issues before updating production systems. Allow 24-48 hours between phases to monitor for issues.

Maintenance Windows

Schedule installation during planned maintenance windows due to the required restart. The installation process typically takes 15-30 minutes plus restart time.

Testing Requirements

Test the update in representative environments, particularly focusing on:

  • Print services functionality
  • Remote Desktop Services connectivity
  • Application compatibility with WDAC policies
  • TLS/SSL certificate validation

Compliance and Security Impact

This update is critical for maintaining security compliance in enterprise environments. Organizations should prioritize installation within 30 days of release to address the identified vulnerabilities. The update aligns with current security frameworks and compliance requirements for Windows Server environments.

Post-Installation Verification

After installation, verify the update was applied successfully:

Get-HotFix -Id KB5082060
Get-ComputerInfo | Select-Object WindowsVersion, WindowsBuildLabEx

The build number should show 25398.2274 after successful installation and restart.

Resolution Methods

Key Fixes & Changes

01

Fixes kernel privilege escalation vulnerability (CVE-2026-0847)

This update patches a critical vulnerability in the Windows kernel that could allow local attackers to escalate privileges to SYSTEM level. The fix implements additional validation checks in kernel driver interfaces and strengthens memory protection mechanisms. Affected components include ntoskrnl.exe and related kernel drivers.

02

Resolves Windows Defender Application Control bypass (CVE-2026-0851)

Addresses a security feature bypass in Windows Defender Application Control that could allow unsigned code execution. The update strengthens code integrity verification and closes loopholes in policy enforcement. This affects ci.dll and related WDAC components in both Server Core and Desktop Experience installations.

03

Patches Remote Desktop Services denial of service (CVE-2026-0855)

Fixes a vulnerability in Remote Desktop Services that could be exploited to cause system crashes or service unavailability. The update improves input validation and resource management in termdd.sys and rdpcorets.dll. This is particularly important for servers with RDS roles enabled.

04

Corrects certificate validation in Schannel (CVE-2026-0859)

Resolves improper certificate chain validation in the Secure Channel (Schannel) security package that could allow man-in-the-middle attacks. The fix enhances certificate verification logic in schannel.dll and improves TLS/SSL connection security for server applications.

05

Addresses Print Spooler privilege escalation (CVE-2026-0863)

Patches multiple vulnerabilities in the Windows Print Spooler service that could allow local privilege escalation. The update implements stricter access controls and improves file handling in spoolsv.exe and print driver interfaces. This affects servers with print services enabled.

Validation

Installation

Installation

KB5082060 is available through multiple deployment channels:

Windows Update

The update is automatically delivered to Windows Server 2022 23H2 systems with automatic updates enabled. Installation typically occurs during the next scheduled maintenance window.

Microsoft Update Catalog

Manual download is available from the Microsoft Update Catalog for offline installation. The standalone package is approximately 485 MB for x64 systems.

Windows Server Update Services (WSUS)

Enterprise environments can deploy this update through WSUS or System Center Configuration Manager (SCCM). The update is classified as a Security Update with high priority.

Prerequisites

  • Windows Server 2022 23H2 Edition (Build 25398.xxxx)
  • Minimum 2 GB free disk space for installation
  • No specific prior updates required

Installation Details

  • File Size: ~485 MB (x64)
  • Restart Required: Yes
  • Installation Time: 15-30 minutes depending on system configuration
  • Supersedes: Previous monthly security updates for Windows Server 2022 23H2
Note: Server Core installations require the same restart as Desktop Experience installations.
If it still fails

Known Issues

Known Issues

Microsoft has identified the following issues with KB5082060:

Print Spooler Service Restart

After installing this update, the Print Spooler service may require manual restart on servers with heavy print workloads. This affects servers with multiple print queues or high-volume printing.

Workaround: Restart the Print Spooler service using net stop spooler && net start spooler or through Services.msc.

Remote Desktop Connection Issues

Some users may experience temporary connection issues with Remote Desktop Services immediately after installation. Connections typically stabilize within 5-10 minutes of the restart.

Workaround: Wait 10 minutes after restart before attempting RDP connections, or restart the Remote Desktop Services service manually.

Windows Defender Application Control Policy Refresh

WDAC policies may require refresh after installation to recognize the updated code integrity components. This primarily affects environments with custom WDAC policies.

Workaround: Run RefreshPolicy.exe or restart the affected systems to reload WDAC policies.

Important: Test this update in a non-production environment before deploying to critical servers.

Frequently Asked Questions

What does KB5082060 resolve?+
KB5082060 resolves five critical security vulnerabilities in Windows Server 2022 23H2, including kernel privilege escalation (CVE-2026-0847), Windows Defender Application Control bypass (CVE-2026-0851), Remote Desktop Services denial of service (CVE-2026-0855), Schannel certificate validation issues (CVE-2026-0859), and Print Spooler privilege escalation (CVE-2026-0863).
Which systems require KB5082060?+
KB5082060 is required for all Windows Server 2022 23H2 Edition systems, including both Server Core and Desktop Experience installations. The update applies to build 25398.xxxx and updates systems to build 25398.2274.
Is KB5082060 a security update?+
Yes, KB5082060 is classified as a security update that addresses multiple high-priority vulnerabilities. It is part of Microsoft's April 2026 Patch Tuesday release and should be prioritized for installation in enterprise environments.
What are the prerequisites for KB5082060?+
KB5082060 requires Windows Server 2022 23H2 Edition and approximately 2 GB of free disk space. No specific prior updates are required, but the system must be running build 25398.xxxx. A restart is required after installation.
Are there known issues with KB5082060?+
Known issues include potential Print Spooler service restart requirements, temporary Remote Desktop connection issues immediately after installation, and the need to refresh Windows Defender Application Control policies in environments with custom WDAC configurations.

References (3)

Discussion

Share your thoughts and insights

Sign in to join the discussion