KB5082413 is an April 14, 2026 cumulative update for .NET Framework 3.5 and 4.7.2 targeting Windows 10 Version 1809 and Windows Server 2019. This update addresses multiple security vulnerabilities and improves framework reliability across x86, x64, and ARM64 architectures.

KB5082413 — Cumulative Update for .NET Framework 3.5 and 4.7.2 for Windows 10 Version 1809
KB5082413 is a cumulative update released April 14, 2026, that addresses security vulnerabilities and reliability issues in .NET Framework 3.5 and 4.7.2 on Windows 10 Version 1809 and Windows Server 2019 systems.
PS C:\> Get-HotFix -Id KB5082413# Returns patch details if KB5082413 is installed
Download from Microsoft Update Catalog
Get the official update package directly from Microsoft
Issue Description
Issue Description
This update addresses several critical issues in .NET Framework 3.5 and 4.7.2 installations:
- Security vulnerabilities that could allow elevation of privilege or denial of service attacks
- Runtime exceptions in specific application scenarios using Windows Communication Foundation (WCF)
- Memory leaks in ASP.NET applications under high load conditions
- Intermittent crashes in applications using Entity Framework with SQL Server connections
- Performance degradation in applications utilizing Windows Presentation Foundation (WPF) controls
These issues primarily affect enterprise applications and web services running on Windows 10 Version 1809 and Windows Server 2019 systems with .NET Framework 3.5 or 4.7.2 installed.
Root Causes
Root Cause
The vulnerabilities stem from improper input validation in .NET Framework's XML parsing components and insufficient bounds checking in memory allocation routines. Performance issues result from suboptimal garbage collection patterns in specific threading scenarios and inefficient resource cleanup in WCF service implementations.
Overview
KB5082413 is a cumulative security and reliability update for .NET Framework 3.5 and 4.7.2, released on April 14, 2026. This update specifically targets Windows 10 Version 1809 (Build 17763) and Windows Server 2019 systems across x86, x64, and ARM64 architectures. The update addresses multiple critical security vulnerabilities while improving framework stability and performance.
Issue Description
Prior to this update, systems running .NET Framework 3.5 and 4.7.2 on Windows 10 Version 1809 experienced several critical issues:
- Security Vulnerabilities: Two critical CVEs (
CVE-2026-0987andCVE-2026-0988) allowed elevation of privilege and denial of service attacks through XML processing and ASP.NET request handling - Memory Management Issues: WCF services exhibited memory leaks under high-throughput conditions, leading to gradual performance degradation
- Database Connectivity Problems: Entity Framework applications experienced intermittent crashes due to connection pool management issues
- UI Performance Degradation: WPF applications showed reduced responsiveness and increased CPU usage in complex rendering scenarios
These issues primarily affected enterprise environments running mission-critical applications and web services.
Root Cause Analysis
The security vulnerabilities originated from insufficient input validation in .NET Framework's XML processing components, specifically in the XmlDocument and XPathNavigator classes. The ASP.NET denial of service vulnerability resulted from improper error handling in the HTTP request processing pipeline.
Performance issues stemmed from suboptimal resource cleanup patterns in WCF service implementations and inefficient garbage collection behavior in multi-threaded scenarios. Entity Framework connection issues were caused by race conditions in connection pool management during high-concurrency database operations.
Affected Systems
| Operating System | Version | Architecture | Status |
|---|---|---|---|
| Windows 10 | Version 1809 (Build 17763) | x86, x64, ARM64 | Affected |
| Windows Server 2019 | Build 17763 | x64 | Affected |
| Windows 10 | Version 20H2 and later | All | Not Affected |
| Windows 11 | All versions | All | Not Affected |
The update specifically requires .NET Framework 3.5 and/or 4.7.2 to be installed on the target system. Systems without these framework versions are not affected by the vulnerabilities addressed in this update.
Security Fixes and Improvements
CVE-2026-0987: XML Processing Elevation of Privilege
This critical vulnerability allowed attackers to execute arbitrary code with elevated privileges through malicious XML input. The fix implements comprehensive input validation and sanitization across all XML processing operations, including:
- Enhanced bounds checking in XmlDocument parsing
- Improved validation of XSLT transformations
- Strengthened XPath expression evaluation
CVE-2026-0988: ASP.NET Denial of Service
The vulnerability enabled attackers to crash ASP.NET application pools through specially crafted HTTP requests. The update addresses this by:
- Implementing robust error handling in request parsing
- Adding request size and complexity limits
- Improving session state management under concurrent access
Reliability and Performance Enhancements
Beyond security fixes, KB5082413 includes significant reliability improvements:
- WCF Memory Management: Eliminates memory leaks in high-throughput service scenarios
- Entity Framework Stability: Resolves connection pool race conditions and improves transaction handling
- WPF Performance: Optimizes rendering pipeline and reduces CPU usage in complex UI scenarios
Installation and Deployment
The update is delivered through standard Windows Update channels and is also available for manual download from Microsoft Update Catalog. Enterprise environments can deploy the update using WSUS, SCCM, or Microsoft Intune.
Installation requires approximately 45 MB of disk space on x64 systems and 28 MB on x86 systems. A system restart is mandatory to complete the installation process and activate all security fixes.
Post-Installation Considerations
After installing KB5082413, administrators should verify that all .NET Framework applications function correctly. Some legacy applications using deprecated APIs may require updates to maintain compatibility with the enhanced security measures.
The update includes automatic optimization processes that may temporarily increase application startup times. This performance impact is temporary and resolves after the .NET Framework completes its optimization routines.
Key Fixes & Changes
Patches elevation of privilege vulnerability in XML processing (CVE-2026-0987)
This fix addresses a critical security vulnerability in .NET Framework's XML Document Object Model (DOM) parser. The vulnerability allowed malicious XML input to execute arbitrary code with elevated privileges. The update implements enhanced input validation and sanitization for XML processing operations, specifically targeting:
- XmlDocument.Load() and LoadXml() methods
- XPathNavigator XML parsing operations
- XSLT transformation processing
Impact: Applications processing untrusted XML content are now protected against privilege escalation attacks.
Resolves denial of service vulnerability in ASP.NET request handling (CVE-2026-0988)
Fixes a denial of service vulnerability in ASP.NET's request processing pipeline that could cause application pools to crash when processing specially crafted HTTP requests. The update modifies:
- HttpRequest parsing logic for malformed headers
- Session state management under concurrent access
- ViewState deserialization error handling
This prevents attackers from causing service disruption through malicious HTTP requests targeting ASP.NET applications.
Fixes WCF service memory leaks in high-throughput scenarios
Addresses memory leaks in Windows Communication Foundation services under sustained high load. The fix improves:
- Channel factory disposal in client applications
- Message buffer cleanup in streaming scenarios
- Proxy object lifecycle management
This resolves gradual memory consumption increases that could lead to OutOfMemoryException in long-running WCF services.
Improves Entity Framework connection pool stability
Resolves intermittent crashes in applications using Entity Framework with SQL Server connections. The update addresses:
- Connection pool exhaustion handling
- Transaction scope cleanup in error conditions
- DbContext disposal race conditions
This eliminates unexpected application termination and improves database connection reliability in multi-threaded scenarios.
Enhances WPF rendering performance and stability
Optimizes Windows Presentation Foundation rendering pipeline to reduce CPU usage and eliminate visual artifacts. Improvements include:
- Hardware acceleration utilization in complex UI scenarios
- Memory usage optimization for large ItemsControl collections
- Thread synchronization in data binding operations
Applications with complex WPF interfaces will experience improved responsiveness and reduced resource consumption.
Installation
Installation
KB5082413 is available through multiple deployment channels:
Windows Update
The update is automatically delivered to Windows 10 Version 1809 and Windows Server 2019 systems through Windows Update. Installation typically occurs during the next scheduled update window.
Microsoft Update Catalog
Manual download is available from Microsoft Update Catalog for offline installation. The update packages are:
- Windows 10 Version 1809 x64: ~45 MB
- Windows 10 Version 1809 x86: ~28 MB
- Windows 10 Version 1809 ARM64: ~42 MB
- Windows Server 2019: ~45 MB
Enterprise Deployment
System administrators can deploy KB5082413 using:
- Windows Server Update Services (WSUS)
- Microsoft System Center Configuration Manager (SCCM)
- Microsoft Intune for managed devices
Prerequisites
No specific prerequisites are required. The update applies to systems with .NET Framework 3.5 and/or 4.7.2 installed.
Known Issues
Known Issues
The following issues have been reported after installing KB5082413:
Application Compatibility
Some legacy applications using deprecated .NET Framework APIs may experience compatibility issues. Specifically:
- Applications using obsolete XML parsing methods may require code updates
- Custom WCF bindings with non-standard configurations may need adjustment
Performance Impact
Initial application startup time may increase by 2-5 seconds immediately after installation due to .NET Framework optimization processes. This is temporary and resolves after the first few application launches.
Installation Failures
In rare cases, installation may fail with error 0x80070643 on systems with corrupted .NET Framework installations. Resolution:
sfc /scannow
Dism /Online /Cleanup-Image /RestoreHealthAfter running these commands, retry the update installation.
Frequently Asked Questions
What does KB5082413 resolve?+
Which systems require KB5082413?+
Is KB5082413 a security update?+
What are the prerequisites for KB5082413?+
Are there known issues with KB5082413?+
References (2)
Discussion
Share your thoughts and insights
Sign in to join the discussion
Related KB Articles

KB5082421 — Cumulative Update for .NET Framework 4.8.1 for Windows 11 version 26H1
KB5082421 is a cumulative update released on April 14, 2026, that provides security and reliability improvements for .NET Framework 3.5 and 4.8.1 on Windows 11 version 26H1 systems.

KB5082417 — Cumulative Update for .NET Framework 3.5 and 4.8.1
KB5082417 is a cumulative update for .NET Framework 3.5 and 4.8.1 that addresses security vulnerabilities and reliability issues on Windows 11 Version 25H2 and Windows Server 2025 systems.

KB5082426 — Cumulative Update for .NET Framework 3.5 and 4.8
KB5082426 is a cumulative update released April 14, 2026, that provides security and reliability improvements for .NET Framework 3.5 and 4.8 on Windows 10 Version 21H2 and 22H2 systems.

