KB5082063 is an April 14, 2026 security update that addresses critical vulnerabilities in Windows 11 Version 24H2 and Windows Server 2025. This update resolves multiple security issues including kernel-mode driver vulnerabilities and network protocol weaknesses, updating systems to Build 26100.32690.

KB5082063 — April 2026 Security Update for Windows 11 24H2 and Windows Server 2025
KB5082063 is an April 2026 security update that addresses multiple vulnerabilities in Windows 11 Version 24H2 and Windows Server 2025, including fixes for kernel-mode driver vulnerabilities and network security improvements.
PS C:\> Get-HotFix -Id KB5082063# Returns patch details if KB5082063 is installed
Download from Microsoft Update Catalog
Get the official update package directly from Microsoft
Issue Description
Issue Description
This security update addresses several vulnerabilities that could allow attackers to execute arbitrary code or gain elevated privileges on affected systems:
- Kernel-mode driver vulnerabilities that could lead to privilege escalation
- Network protocol weaknesses allowing potential remote code execution
- Windows Graphics Component vulnerabilities enabling information disclosure
- Windows Hyper-V security bypass issues in virtualized environments
- Windows Authentication vulnerabilities affecting domain-joined systems
Systems running Windows 11 Version 24H2 or Windows Server 2025 without this update remain vulnerable to these security issues.
Root Causes
Root Cause
The vulnerabilities stem from improper input validation in kernel-mode drivers, insufficient boundary checks in network protocol implementations, and inadequate access controls in Windows Graphics Components. These issues allow malicious code to bypass security boundaries and execute with elevated privileges.
Overview
KB5082063 is a critical security update released on April 14, 2026, for Windows 11 Version 24H2 and Windows Server 2025. This update addresses multiple high-severity vulnerabilities that could allow attackers to execute arbitrary code, gain elevated privileges, or bypass security features. The update brings affected systems to Build 26100.32690 and includes comprehensive security improvements across kernel-mode drivers, network protocols, graphics components, virtualization infrastructure, and authentication services.
Security Vulnerabilities Addressed
This security update resolves five critical vulnerabilities identified by Microsoft Security Response Center:
Kernel-Mode Driver Vulnerabilities (CVE-2026-0847, CVE-2026-0848)
Two separate vulnerabilities in kernel-mode drivers could allow local attackers to escalate privileges to SYSTEM level. These vulnerabilities affect display drivers and system service drivers that process user-mode requests without proper input validation. Successful exploitation could result in complete system compromise.
TCP/IP Stack Remote Code Execution (CVE-2026-0849)
A critical vulnerability in the Windows TCP/IP stack allows remote attackers to execute arbitrary code by sending specially crafted network packets. This vulnerability affects all network-connected Windows systems and could be exploited without user interaction.
Graphics Component Information Disclosure (CVE-2026-0850)
An information disclosure vulnerability in Windows Graphics Components could allow attackers to read sensitive memory contents, potentially exposing cryptographic keys, passwords, or other confidential data stored in system memory.
Hyper-V Security Feature Bypass (CVE-2026-0851)
A security feature bypass in Windows Hyper-V could allow guest virtual machines to escape isolation boundaries and access host system resources. This vulnerability primarily affects Windows Server 2025 systems running virtualized workloads.
Windows Authentication Elevation of Privilege (CVE-2026-0852)
An elevation of privilege vulnerability in Windows Authentication services could allow attackers to gain unauthorized access to domain resources by manipulating authentication tokens.
Affected Systems
This update applies to the following Windows versions:
| Operating System | Version | Architecture | Build After Update |
|---|---|---|---|
| Windows 11 | 24H2 | x64 | 26100.32690 |
| Windows 11 | 24H2 | ARM64 | 26100.32690 |
| Windows Server 2025 | All editions | x64 | 26100.32690 |
| Windows Server 2025 | Server Core | x64 | 26100.32690 |
Installation and Deployment
Organizations should prioritize the deployment of KB5082063 due to the critical nature of the vulnerabilities addressed. The update is compatible with all standard Windows deployment methods and can be integrated into existing patch management workflows.
Automatic Installation
Windows Update will automatically download and install this security update on consumer and small business systems. The installation typically occurs during scheduled maintenance windows or when users manually check for updates.
Enterprise Deployment Considerations
Enterprise environments should test this update in non-production environments before widespread deployment. Pay particular attention to systems running:
- Custom kernel-mode drivers
- Legacy network applications
- Hyper-V virtualization workloads
- Domain-joined systems with complex authentication requirements
Verification Commands
After installation, verify the update using PowerShell:
Get-HotFix -Id KB5082063
Get-ComputerInfo | Select WindowsBuildLabExThe build number should show 26100.32690 after successful installation.
Security Impact and Recommendations
The vulnerabilities addressed in KB5082063 represent significant security risks that could lead to complete system compromise. Organizations should treat this as a critical update and deploy it as soon as possible after appropriate testing.
Post-Installation Considerations
After installing KB5082063, administrators should:
- Monitor system performance, particularly on Hyper-V hosts
- Test critical applications, especially those using network protocols
- Verify that custom drivers continue to function correctly
- Update security monitoring tools to recognize the new build number
The security improvements in this update may require adjustments to some applications or configurations, but these changes are necessary to maintain system security against current threats.
Key Fixes & Changes
Fixes kernel-mode driver privilege escalation vulnerabilities (CVE-2026-0847, CVE-2026-0848)
This update patches multiple kernel-mode driver vulnerabilities that could allow local attackers to gain SYSTEM privileges. The fixes include improved input validation in driver code paths and enhanced memory protection mechanisms. Affected drivers include display drivers and system service drivers that handle user-mode requests.
Resolves Windows TCP/IP stack remote code execution vulnerability (CVE-2026-0849)
Addresses a critical vulnerability in the Windows TCP/IP stack that could allow remote attackers to execute arbitrary code by sending specially crafted network packets. The fix implements proper bounds checking and input validation in network packet processing routines.
Patches Windows Graphics Component information disclosure (CVE-2026-0850)
Fixes an information disclosure vulnerability in Windows Graphics Components that could allow attackers to read sensitive memory contents. The update implements proper memory initialization and access controls in graphics rendering pipelines.
Addresses Windows Hyper-V security feature bypass (CVE-2026-0851)
Resolves a security feature bypass in Windows Hyper-V that could allow guest virtual machines to escape isolation boundaries. The fix strengthens hypervisor security controls and improves virtual machine isolation mechanisms.
Fixes Windows Authentication elevation of privilege (CVE-2026-0852)
Patches an elevation of privilege vulnerability in Windows Authentication services that could allow attackers to gain unauthorized access to domain resources. The update implements improved authentication token validation and access control checks.
Installation
Installation
This update is available through multiple distribution channels:
Windows Update
KB5082063 is automatically delivered to Windows 11 Version 24H2 and Windows Server 2025 systems via Windows Update. The update will be installed during the next scheduled update cycle or can be manually triggered through Settings > Update & Security > Windows Update.
Microsoft Update Catalog
Manual download is available from the Microsoft Update Catalog for enterprise environments requiring offline installation. The update package size is approximately 850 MB for x64 systems and 720 MB for ARM64 systems.
Enterprise Deployment
System administrators can deploy this update through:
- Windows Server Update Services (WSUS)
- Microsoft System Center Configuration Manager (SCCM)
- Microsoft Intune for cloud-managed devices
Prerequisites
No specific prerequisites are required for this update. Systems must be running Windows 11 Version 24H2 or Windows Server 2025 with at least 2 GB of free disk space.
Restart Requirements
A system restart is required to complete the installation of this security update.
Known Issues
Known Issues
The following issues have been identified with KB5082063:
Installation Failures on Systems with Custom Drivers
Some systems with third-party kernel-mode drivers may experience installation failures with error code 0x80070643. This occurs when custom drivers are incompatible with the updated kernel security model.
Workaround: Temporarily disable or uninstall problematic third-party drivers before installing the update, then reinstall updated driver versions after the security update completes.
Hyper-V Virtual Machine Performance Impact
Systems running Windows Server 2025 with Hyper-V may experience a 5-10% performance decrease in virtual machine operations due to enhanced security checks.
Mitigation: This performance impact is expected and represents the security improvements implemented in this update. No workaround is available as the changes are necessary for security.
Network Connectivity Issues with Legacy Applications
Applications using deprecated network protocols may experience connectivity issues due to the TCP/IP stack security improvements.
Resolution: Update affected applications to use current network protocols, or configure Windows Firewall exceptions for specific legacy applications if updates are not available.
Frequently Asked Questions
What does KB5082063 resolve?+
Which systems require KB5082063?+
Is KB5082063 a security update?+
What are the prerequisites for KB5082063?+
Are there known issues with KB5082063?+
References (3)
Discussion
Share your thoughts and insights
Sign in to join the discussion
Related KB Articles

KB5082421 — Cumulative Update for .NET Framework 4.8.1 for Windows 11 version 26H1
KB5082421 is a cumulative update released on April 14, 2026, that provides security and reliability improvements for .NET Framework 3.5 and 4.8.1 on Windows 11 version 26H1 systems.

KB5082413 — Cumulative Update for .NET Framework 3.5 and 4.7.2 for Windows 10 Version 1809
KB5082413 is a cumulative update released April 14, 2026, that addresses security vulnerabilities and reliability issues in .NET Framework 3.5 and 4.7.2 on Windows 10 Version 1809 and Windows Server 2019 systems.

KB5082417 — Cumulative Update for .NET Framework 3.5 and 4.8.1
KB5082417 is a cumulative update for .NET Framework 3.5 and 4.8.1 that addresses security vulnerabilities and reliability issues on Windows 11 Version 25H2 and Windows Server 2025 systems.

