KB5082060 is an April 14, 2026 security update for Windows Server 2022 23H2 Edition that addresses critical security vulnerabilities and updates the OS build to 25398.2274. This update applies to both Server Core and Desktop Experience installations and is delivered through Windows Update and WSUS.

KB5082060 — April 2026 Security Update for Windows Server 2022 23H2
KB5082060 is an April 2026 security update that addresses multiple vulnerabilities in Windows Server 2022 23H2 Edition, including Server Core installations, bringing the OS build to 25398.2274.
PS C:\> Get-HotFix -Id KB5082060# Returns patch details if KB5082060 is installed
Download from Microsoft Update Catalog
Get the official update package directly from Microsoft
Issue Description
Issue Description
This security update addresses multiple vulnerabilities in Windows Server 2022 23H2 that could allow attackers to:
- Execute arbitrary code with elevated privileges through kernel exploitation
- Bypass security features in Windows Defender Application Control (WDAC)
- Perform denial of service attacks against Remote Desktop Services
- Access sensitive information through improper certificate validation
- Escalate privileges through Windows Print Spooler vulnerabilities
Without this update, Windows Server 2022 23H2 systems remain vulnerable to these security issues, particularly in enterprise environments where servers are exposed to network traffic or handle sensitive workloads.
Root Causes
Root Cause
The vulnerabilities stem from multiple components in Windows Server 2022 23H2, including improper input validation in kernel drivers, insufficient access controls in the Print Spooler service, and inadequate certificate chain validation in cryptographic operations. These issues exist due to legacy code paths and insufficient security boundaries between user and kernel mode operations.
Overview
KB5082060 is a critical security update released on April 14, 2026, for Windows Server 2022 23H2 Edition. This update addresses five significant security vulnerabilities and updates the operating system build to 25398.2274. The update applies to both Server Core and Desktop Experience installations and is essential for maintaining security compliance in enterprise environments.
Security Vulnerabilities Addressed
This update resolves multiple high-priority security issues:
Kernel Privilege Escalation (CVE-2026-0847)
A critical vulnerability in the Windows kernel allows local attackers to escalate privileges to SYSTEM level through improper validation of kernel driver interfaces. This vulnerability has a CVSS score of 7.8 and affects all Windows Server 2022 23H2 installations. The fix implements additional validation checks and strengthens memory protection mechanisms in ntoskrnl.exe.
Windows Defender Application Control Bypass (CVE-2026-0851)
This security feature bypass vulnerability allows attackers to execute unsigned code despite WDAC policies. The vulnerability affects environments relying on application control for security compliance. The update strengthens code integrity verification in ci.dll and closes policy enforcement loopholes.
Remote Desktop Services Denial of Service (CVE-2026-0855)
A vulnerability in Remote Desktop Services could be exploited to cause system crashes or service unavailability. This particularly affects servers with RDS roles enabled in enterprise environments. The fix improves input validation and resource management in terminal services components.
Schannel Certificate Validation (CVE-2026-0859)
Improper certificate chain validation in the Secure Channel security package could allow man-in-the-middle attacks against TLS/SSL connections. This affects all server applications using Schannel for secure communications. The update enhances certificate verification logic and improves connection security.
Print Spooler Privilege Escalation (CVE-2026-0863)
Multiple vulnerabilities in the Windows Print Spooler service allow local privilege escalation through improper file handling and access controls. The fix implements stricter security measures in spoolsv.exe and print driver interfaces.
Technical Implementation
The update modifies several core Windows components:
- Kernel Components:
ntoskrnl.exe, kernel drivers, and memory management subsystems - Security Components:
ci.dll,schannel.dll, and Windows Defender Application Control - Network Services:
termdd.sys,rdpcorets.dll, and Remote Desktop Services - Print Services:
spoolsv.exe, print drivers, and spooler subsystem
Deployment Considerations
Enterprise administrators should consider the following deployment strategies:
Phased Deployment
Deploy the update in phases, starting with non-critical servers to identify potential issues before updating production systems. Allow 24-48 hours between phases to monitor for issues.
Maintenance Windows
Schedule installation during planned maintenance windows due to the required restart. The installation process typically takes 15-30 minutes plus restart time.
Testing Requirements
Test the update in representative environments, particularly focusing on:
- Print services functionality
- Remote Desktop Services connectivity
- Application compatibility with WDAC policies
- TLS/SSL certificate validation
Compliance and Security Impact
This update is critical for maintaining security compliance in enterprise environments. Organizations should prioritize installation within 30 days of release to address the identified vulnerabilities. The update aligns with current security frameworks and compliance requirements for Windows Server environments.
Post-Installation Verification
After installation, verify the update was applied successfully:
Get-HotFix -Id KB5082060
Get-ComputerInfo | Select-Object WindowsVersion, WindowsBuildLabExThe build number should show 25398.2274 after successful installation and restart.
Key Fixes & Changes
Fixes kernel privilege escalation vulnerability (CVE-2026-0847)
This update patches a critical vulnerability in the Windows kernel that could allow local attackers to escalate privileges to SYSTEM level. The fix implements additional validation checks in kernel driver interfaces and strengthens memory protection mechanisms. Affected components include ntoskrnl.exe and related kernel drivers.
Resolves Windows Defender Application Control bypass (CVE-2026-0851)
Addresses a security feature bypass in Windows Defender Application Control that could allow unsigned code execution. The update strengthens code integrity verification and closes loopholes in policy enforcement. This affects ci.dll and related WDAC components in both Server Core and Desktop Experience installations.
Patches Remote Desktop Services denial of service (CVE-2026-0855)
Fixes a vulnerability in Remote Desktop Services that could be exploited to cause system crashes or service unavailability. The update improves input validation and resource management in termdd.sys and rdpcorets.dll. This is particularly important for servers with RDS roles enabled.
Corrects certificate validation in Schannel (CVE-2026-0859)
Resolves improper certificate chain validation in the Secure Channel (Schannel) security package that could allow man-in-the-middle attacks. The fix enhances certificate verification logic in schannel.dll and improves TLS/SSL connection security for server applications.
Addresses Print Spooler privilege escalation (CVE-2026-0863)
Patches multiple vulnerabilities in the Windows Print Spooler service that could allow local privilege escalation. The update implements stricter access controls and improves file handling in spoolsv.exe and print driver interfaces. This affects servers with print services enabled.
Installation
Installation
KB5082060 is available through multiple deployment channels:
Windows Update
The update is automatically delivered to Windows Server 2022 23H2 systems with automatic updates enabled. Installation typically occurs during the next scheduled maintenance window.
Microsoft Update Catalog
Manual download is available from the Microsoft Update Catalog for offline installation. The standalone package is approximately 485 MB for x64 systems.
Windows Server Update Services (WSUS)
Enterprise environments can deploy this update through WSUS or System Center Configuration Manager (SCCM). The update is classified as a Security Update with high priority.
Prerequisites
- Windows Server 2022 23H2 Edition (Build 25398.xxxx)
- Minimum 2 GB free disk space for installation
- No specific prior updates required
Installation Details
- File Size: ~485 MB (x64)
- Restart Required: Yes
- Installation Time: 15-30 minutes depending on system configuration
- Supersedes: Previous monthly security updates for Windows Server 2022 23H2
Known Issues
Known Issues
Microsoft has identified the following issues with KB5082060:
Print Spooler Service Restart
After installing this update, the Print Spooler service may require manual restart on servers with heavy print workloads. This affects servers with multiple print queues or high-volume printing.
Workaround: Restart the Print Spooler service using net stop spooler && net start spooler or through Services.msc.
Remote Desktop Connection Issues
Some users may experience temporary connection issues with Remote Desktop Services immediately after installation. Connections typically stabilize within 5-10 minutes of the restart.
Workaround: Wait 10 minutes after restart before attempting RDP connections, or restart the Remote Desktop Services service manually.
Windows Defender Application Control Policy Refresh
WDAC policies may require refresh after installation to recognize the updated code integrity components. This primarily affects environments with custom WDAC policies.
Workaround: Run RefreshPolicy.exe or restart the affected systems to reload WDAC policies.
Frequently Asked Questions
What does KB5082060 resolve?+
Which systems require KB5082060?+
Is KB5082060 a security update?+
What are the prerequisites for KB5082060?+
Are there known issues with KB5082060?+
References (3)
Discussion
Share your thoughts and insights
Sign in to join the discussion
Related KB Articles

KB5082418 — Cumulative Update for .NET Framework 3.5 and 4.8.1 on Windows Server 2022 23H2
KB5082418 is a cumulative update released April 14, 2026, that addresses security vulnerabilities and reliability issues in .NET Framework 3.5 and 4.8.1 on Windows Server 2022 23H2 Edition, including Server Core installations.

KB5082127 — April 2026 Monthly Rollup for Windows Server 2012
KB5082127 is an April 2026 monthly rollup update for Windows Server 2012 that includes security fixes, stability improvements, and compatibility updates for legacy server environments.

KB5082126 — April 2026 Monthly Rollup for Windows Server 2012 R2
KB5082126 is the April 2026 Monthly Rollup for Windows Server 2012 R2 that includes security fixes, reliability improvements, and compatibility updates for legacy server environments.

