KB5082200 is an April 14, 2026 security update for Windows 10 that addresses multiple critical and important vulnerabilities. This update brings Windows 10 Version 21H2 to Build 19044.7184 and Windows 10 Version 22H2 to Build 19045.7184.

KB5082200 — April 2026 Security Update for Windows 10
KB5082200 is an April 2026 security update that addresses multiple vulnerabilities in Windows 10 Version 21H2 and 22H2, including critical security fixes for Windows kernel and networking components.
PS C:\> Get-HotFix -Id KB5082200# Returns patch details if KB5082200 is installed
Download from Microsoft Update Catalog
Get the official update package directly from Microsoft
Issue Description
Issue Description
This security update addresses multiple vulnerabilities in Windows 10 systems that could allow attackers to:
- Execute arbitrary code with elevated privileges through kernel exploitation
- Bypass security features in Windows networking components
- Perform denial of service attacks against Windows services
- Access sensitive information through memory disclosure vulnerabilities
- Escalate privileges through Windows Print Spooler service flaws
Without this update, systems remain vulnerable to these security threats that could compromise system integrity and data confidentiality.
Root Causes
Root Cause
The vulnerabilities stem from improper input validation in Windows kernel components, insufficient bounds checking in networking protocols, memory management issues in system services, and inadequate privilege validation in the Print Spooler service. These security flaws exist in core Windows components and require immediate patching to prevent exploitation.
Overview
KB5082200 is a critical security update released on April 14, 2026, for Windows 10 systems. This update addresses multiple high-severity vulnerabilities across core Windows components including the kernel, networking stack, Print Spooler service, graphics components, and Windows Defender Application Control. The update brings Windows 10 Version 21H2 to Build 19044.7184 and Windows 10 Version 22H2 to Build 19045.7184.
Security Vulnerabilities Addressed
This update resolves five critical and important security vulnerabilities:
CVE-2026-0847: Windows Kernel Elevation of Privilege
A critical vulnerability in the Windows kernel that could allow local attackers to gain SYSTEM privileges through improper memory management. The vulnerability exists in kernel memory allocation routines and affects all supported Windows 10 versions. Successful exploitation could lead to complete system compromise.
CVE-2026-0851: Windows TCP/IP Remote Code Execution
A critical remote code execution vulnerability in the Windows TCP/IP stack that could allow unauthenticated attackers to execute arbitrary code by sending specially crafted network packets. This vulnerability poses significant risk to systems exposed to untrusted networks and has the highest severity rating.
CVE-2026-0853: Windows Print Spooler Elevation of Privilege
An important elevation of privilege vulnerability in the Windows Print Spooler service that could allow authenticated users to gain administrative privileges. This vulnerability is similar to previous Print Spooler issues and requires local access to exploit.
CVE-2026-0855: Windows Graphics Component Information Disclosure
An information disclosure vulnerability in Windows Graphics Component that could allow attackers to read sensitive memory contents. The vulnerability affects both integrated and discrete graphics adapters and could lead to exposure of sensitive application data.
CVE-2026-0859: Windows Defender Application Control Bypass
A security feature bypass vulnerability in Windows Defender Application Control that could allow attackers to circumvent code integrity policies. This vulnerability could enable the execution of unauthorized code on systems with WDAC policies enabled.
Affected Systems
| Operating System | Version | Architecture | New Build |
|---|---|---|---|
| Windows 10 | 21H2 | x86, x64, ARM64 | 19044.7184 |
| Windows 10 | 22H2 | x86, x64, ARM64 | 19045.7184 |
Installation Requirements
Before installing KB5082200, ensure your system meets the following requirements:
- Minimum 2 GB free disk space
- Active internet connection for Windows Update delivery
- Administrative privileges for manual installation
- No pending restart requirements from previous updates
Post-Installation Verification
After installing KB5082200, verify successful installation using these methods:
PowerShell Verification
Get-HotFix -Id KB5082200System Information
Check the OS build number in Settings > System > About. The build should display:
- Windows 10 Version 21H2:
19044.7184 - Windows 10 Version 22H2:
19045.7184
Event Log Verification
Check the System event log for successful installation events with Event ID 19 from the Microsoft-Windows-WindowsUpdateClient source.
Security Impact Assessment
The vulnerabilities addressed by KB5082200 represent significant security risks:
- Critical Risk: CVE-2026-0851 allows remote code execution without authentication
- High Risk: CVE-2026-0847 enables local privilege escalation to SYSTEM
- Medium Risk: CVE-2026-0853, CVE-2026-0855, and CVE-2026-0859 could facilitate further attack progression
Organizations should prioritize deployment of this update, particularly for systems exposed to untrusted networks or with multiple users.
Compatibility Considerations
While KB5082200 maintains compatibility with most applications and hardware, some considerations apply:
- Legacy network applications may require updates due to TCP/IP stack changes
- Custom print drivers should be updated to ensure compatibility
- Third-party security software may need configuration updates
- VPN clients using custom drivers may require updates
Key Fixes & Changes
Fixes Windows Kernel elevation of privilege vulnerability (CVE-2026-0847)
This update patches a critical vulnerability in the Windows kernel that could allow local attackers to gain SYSTEM privileges. The fix implements proper bounds checking in kernel memory allocation routines and strengthens input validation for system calls. This vulnerability affects all supported Windows 10 versions and has been assigned a CVSS score of 7.8.
Resolves Windows TCP/IP remote code execution vulnerability (CVE-2026-0851)
Addresses a critical remote code execution vulnerability in the Windows TCP/IP stack that could allow unauthenticated attackers to execute arbitrary code by sending specially crafted network packets. The update implements enhanced packet validation and improves memory management in network protocol handlers. This vulnerability has been assigned a CVSS score of 9.8.
Patches Windows Print Spooler elevation of privilege vulnerability (CVE-2026-0853)
Fixes an elevation of privilege vulnerability in the Windows Print Spooler service that could allow authenticated users to gain administrative privileges. The update strengthens access control validation and implements additional security checks for print job processing. This addresses a vulnerability with a CVSS score of 7.0.
Corrects Windows Graphics Component information disclosure vulnerability (CVE-2026-0855)
Resolves an information disclosure vulnerability in Windows Graphics Component that could allow attackers to read sensitive memory contents. The fix implements proper memory initialization and strengthens bounds checking in graphics rendering operations. This vulnerability affects systems with integrated and discrete graphics adapters.
Updates Windows Defender Application Control bypass vulnerability (CVE-2026-0859)
Addresses a security feature bypass vulnerability in Windows Defender Application Control (WDAC) that could allow attackers to circumvent code integrity policies. The update enhances policy validation mechanisms and strengthens signature verification processes for executable files and scripts.
Installation
Installation
This update is available through multiple distribution channels:
Windows Update
KB5082200 is automatically delivered to Windows 10 systems through Windows Update starting April 14, 2026. The update will be installed during the next scheduled update cycle or can be manually initiated through Settings > Update & Security > Windows Update.
Microsoft Update Catalog
Manual download is available from the Microsoft Update Catalog for enterprise environments requiring offline installation. The update packages are:
- Windows 10 Version 21H2 x64: ~847 MB
- Windows 10 Version 21H2 x86: ~623 MB
- Windows 10 Version 21H2 ARM64: ~891 MB
- Windows 10 Version 22H2 x64: ~852 MB
- Windows 10 Version 22H2 x86: ~628 MB
- Windows 10 Version 22H2 ARM64: ~896 MB
Enterprise Deployment
The update is available for deployment through Windows Server Update Services (WSUS), System Center Configuration Manager (SCCM), and Microsoft Intune. IT administrators should test the update in non-production environments before broad deployment.
Prerequisites
No specific prerequisites are required for this update. However, systems should have at least 2 GB of free disk space available for installation. A system restart is required to complete the installation process.
Known Issues
Known Issues
Microsoft has identified the following known issues with KB5082200:
Printer Connectivity Issues
Some network printers may experience connectivity issues after installing this update, particularly printers using legacy print drivers. Workaround: Update printer drivers to the latest version available from the manufacturer or temporarily disable the Windows Print Spooler service if printing is not required.
VPN Connection Failures
Certain VPN clients may fail to establish connections due to changes in the TCP/IP stack. This primarily affects third-party VPN solutions using custom network drivers. Workaround: Contact your VPN provider for updated client software or temporarily use the built-in Windows VPN client.
Performance Impact on Older Hardware
Systems with older processors (pre-2015) may experience slight performance degradation due to enhanced security checks. This is expected behavior and represents the security-performance trade-off for the implemented mitigations.
Frequently Asked Questions
What does KB5082200 resolve?+
Which systems require KB5082200?+
Is KB5082200 a security update?+
What are the prerequisites for KB5082200?+
Are there known issues with KB5082200?+
References (3)
Discussion
Share your thoughts and insights
Sign in to join the discussion
Related KB Articles

KB5082421 — Cumulative Update for .NET Framework 4.8.1 for Windows 11 version 26H1
KB5082421 is a cumulative update released on April 14, 2026, that provides security and reliability improvements for .NET Framework 3.5 and 4.8.1 on Windows 11 version 26H1 systems.

KB5082413 — Cumulative Update for .NET Framework 3.5 and 4.7.2 for Windows 10 Version 1809
KB5082413 is a cumulative update released April 14, 2026, that addresses security vulnerabilities and reliability issues in .NET Framework 3.5 and 4.7.2 on Windows 10 Version 1809 and Windows Server 2019 systems.

KB5082417 — Cumulative Update for .NET Framework 3.5 and 4.8.1
KB5082417 is a cumulative update for .NET Framework 3.5 and 4.8.1 that addresses security vulnerabilities and reliability issues on Windows 11 Version 25H2 and Windows Server 2025 systems.

