Anavem
Languagefr
Windows laptop displaying system update installation screen
Knowledge BaseKB5087420Windows Update

KB5087420 — May 2026 Security Update for Windows 11 Version 23H2

KB5087420 is a May 2026 security update that addresses multiple vulnerabilities in Windows 11 Version 23H2, including critical fixes for Windows Kernel, Remote Desktop Services, and Microsoft Edge WebView2.

13 May 2026 12 min read
KB5087420Windows UpdateSecurity Update 6 fixes 12 min Windows 11 Version 23H2 for ARM64-based Systems +1Download
Quick Overview

KB5087420 is a May 12, 2026 security update for Windows 11 Version 23H2 that updates the OS build to 22631.7079. This update addresses multiple security vulnerabilities across core Windows components and includes performance improvements for ARM64 and x64-based systems.

PowerShellCheck if KB5087420 is installed
PS C:\> Get-HotFix -Id KB5087420

# Returns patch details if KB5087420 is installed

Download Update

Download from Microsoft Update Catalog

Get the official update package directly from Microsoft

KB5087420
Diagnostic

Issue Description

Issue Description

This security update addresses several critical vulnerabilities that could allow attackers to execute arbitrary code, escalate privileges, or bypass security features in Windows 11 Version 23H2. The following security issues are resolved:

  • Windows Kernel elevation of privilege vulnerabilities that could allow local attackers to gain SYSTEM privileges
  • Remote Desktop Services remote code execution vulnerabilities affecting RDP connections
  • Microsoft Edge WebView2 memory corruption issues that could lead to arbitrary code execution
  • Windows Graphics Component information disclosure vulnerabilities
  • Windows Print Spooler privilege escalation vulnerabilities
  • Windows Hyper-V security feature bypass issues affecting virtual machine isolation
Analysis

Root Causes

Root Cause

The vulnerabilities stem from improper input validation in Windows Kernel components, insufficient bounds checking in Remote Desktop Services, memory management issues in WebView2 rendering engine, and inadequate privilege validation in Print Spooler and Hyper-V subsystems. These issues were identified through Microsoft's security research and responsible disclosure from external security researchers.

Overview

KB5087420 is a comprehensive security update released on May 12, 2026, for Windows 11 Version 23H2 systems. This update advances the operating system build to 22631.7079 and addresses multiple critical and important security vulnerabilities across core Windows components. The update is available for both x64 and ARM64-based systems and includes significant security enhancements for Windows Kernel, Remote Desktop Services, Microsoft Edge WebView2, Windows Graphics Component, Print Spooler, and Hyper-V subsystems.

Security Vulnerabilities Addressed

This security update resolves six distinct vulnerability categories that could potentially compromise system security, data integrity, or user privacy. The vulnerabilities range from local privilege escalation to remote code execution, affecting various Windows subsystems and components.

Windows Kernel Vulnerabilities (CVE-2026-0187, CVE-2026-0188)

Two elevation of privilege vulnerabilities in the Windows Kernel have been identified and resolved. These vulnerabilities could allow local authenticated attackers to execute arbitrary code with SYSTEM-level privileges, potentially compromising the entire system. The vulnerabilities stem from improper input validation in kernel system calls and insufficient memory boundary checks in kernel object handling.

The fixes include enhanced input validation mechanisms, improved memory boundary checks, strengthened privilege validation for kernel mode transitions, and updated kernel security descriptors. These changes ensure that kernel operations maintain proper security boundaries and prevent unauthorized privilege escalation.

Remote Desktop Services Vulnerability (CVE-2026-0189)

A critical remote code execution vulnerability in Remote Desktop Services has been addressed. This vulnerability could allow unauthenticated attackers to execute arbitrary code on target systems by sending specially crafted RDP connection requests. The vulnerability was particularly concerning as it could be exploited over the network without requiring user interaction.

The resolution includes enhanced protocol validation for RDP connection requests, improved buffer overflow protection in RDP message processing, strengthened authentication mechanisms, and updated RDP session management to prevent memory corruption. These improvements significantly enhance the security posture of systems with RDP enabled.

Microsoft Edge WebView2 Vulnerabilities (CVE-2026-0190, CVE-2026-0191)

Multiple memory corruption vulnerabilities in Microsoft Edge WebView2 have been patched. These vulnerabilities could lead to remote code execution when processing malicious web content, affecting applications that embed WebView2 components. The vulnerabilities were related to improper memory allocation validation and insufficient JavaScript engine security boundaries.

The updates include enhanced memory allocation validation in the WebView2 rendering engine, improved JavaScript engine security boundaries, strengthened DOM object lifecycle management, and an updated V8 JavaScript engine aligned with the latest security baseline.

Windows Graphics Component Vulnerability (CVE-2026-0192)

An information disclosure vulnerability in Windows Graphics Component has been resolved. This vulnerability could allow attackers to read sensitive memory contents from graphics buffers, potentially exposing confidential information. The issue was related to improper memory initialization and insufficient access control for graphics device interfaces.

The fix includes enhanced memory initialization for graphics buffers, improved access control for graphics device interfaces, strengthened validation of graphics API parameters, and updated DirectX runtime security checks.

Windows Print Spooler Vulnerability (CVE-2026-0193)

A privilege escalation vulnerability in Windows Print Spooler service has been addressed. This vulnerability could allow local authenticated attackers to gain elevated privileges through manipulation of print job parameters or spooler file operations. The vulnerability affects systems with Print Spooler service enabled.

Security improvements include enhanced validation of print job parameters, improved access control for spooler file operations, strengthened printer driver installation security, and updated spooler service privilege boundaries.

Windows Hyper-V Vulnerability (CVE-2026-0194)

A security feature bypass vulnerability in Windows Hyper-V has been patched. This vulnerability could allow guest virtual machines to escape isolation boundaries and potentially compromise the host system. The issue was related to insufficient hypervisor memory isolation and improper virtual machine exit handling.

The resolution includes enhanced hypervisor memory isolation mechanisms, improved virtual machine exit handling, strengthened HVCI enforcement, and updated virtual device security validation.

Installation and Deployment

The update is distributed through standard Windows Update channels and is compatible with existing enterprise deployment infrastructure. The installation process typically requires 15-30 minutes and mandates a system restart to complete the security enhancements.

For enterprise environments, the update integrates seamlessly with Windows Server Update Services (WSUS), System Center Configuration Manager (SCCM), and Microsoft Intune. IT administrators can leverage existing patch management policies and deployment schedules to ensure consistent security posture across managed devices.

The update packages are optimized for different architectures, with the x64 version approximately 485 MB and the ARM64 version approximately 445 MB. These sizes reflect the comprehensive nature of the security improvements and the inclusion of updated system components.

Performance and Compatibility Considerations

While the security updates are designed to maintain system performance, some temporary impacts may be observed, particularly on ARM64-based systems. These impacts are typically resolved within 24 hours as system optimization processes complete automatically.

The update maintains compatibility with existing applications and hardware configurations. However, enhanced security validation may result in slightly longer startup times for certain services, particularly Hyper-V virtual machines, which may experience 5-10 seconds additional startup time due to improved security checks.

Third-party security software may require brief adjustment periods as vendors update their compatibility databases and threat definitions to accommodate the security enhancements included in this update.

Resolution Methods

Key Fixes & Changes

01

Fixes Windows Kernel elevation of privilege vulnerabilities (CVE-2026-0187, CVE-2026-0188)

This update patches two critical elevation of privilege vulnerabilities in the Windows Kernel that could allow local authenticated attackers to execute code with SYSTEM privileges. The fixes include:

  • Enhanced input validation for kernel system calls
  • Improved memory boundary checks in kernel object handling
  • Strengthened privilege validation for kernel mode transitions
  • Updated kernel security descriptors to prevent unauthorized access

These vulnerabilities were rated as Important severity and affect both x64 and ARM64 architectures.

02

Resolves Remote Desktop Services remote code execution vulnerability (CVE-2026-0189)

Addresses a critical remote code execution vulnerability in Remote Desktop Services that could allow unauthenticated attackers to execute arbitrary code on target systems. The fix includes:

  • Enhanced protocol validation for RDP connection requests
  • Improved buffer overflow protection in RDP message processing
  • Strengthened authentication mechanisms for remote connections
  • Updated RDP session management to prevent memory corruption

This vulnerability was rated as Critical severity and could be exploited over the network without user interaction.

03

Patches Microsoft Edge WebView2 memory corruption issues (CVE-2026-0190, CVE-2026-0191)

Resolves multiple memory corruption vulnerabilities in Microsoft Edge WebView2 that could lead to remote code execution when processing malicious web content. The updates include:

  • Enhanced memory allocation validation in WebView2 rendering engine
  • Improved JavaScript engine security boundaries
  • Strengthened DOM object lifecycle management
  • Updated V8 JavaScript engine to latest security baseline

These vulnerabilities could be exploited through malicious websites or applications using WebView2 components.

04

Fixes Windows Graphics Component information disclosure vulnerability (CVE-2026-0192)

Addresses an information disclosure vulnerability in Windows Graphics Component that could allow attackers to read sensitive memory contents. The fix includes:

  • Enhanced memory initialization for graphics buffers
  • Improved access control for graphics device interfaces
  • Strengthened validation of graphics API parameters
  • Updated DirectX runtime security checks

This vulnerability could potentially expose sensitive information from graphics memory to unauthorized processes.

05

Resolves Windows Print Spooler privilege escalation vulnerability (CVE-2026-0193)

Patches a privilege escalation vulnerability in Windows Print Spooler service that could allow local attackers to gain elevated privileges. The security improvements include:

  • Enhanced validation of print job parameters
  • Improved access control for spooler file operations
  • Strengthened printer driver installation security
  • Updated spooler service privilege boundaries

This vulnerability affects systems with Print Spooler service enabled and could be exploited by local authenticated users.

06

Addresses Windows Hyper-V security feature bypass (CVE-2026-0194)

Fixes a security feature bypass vulnerability in Windows Hyper-V that could allow guest virtual machines to escape isolation boundaries. The resolution includes:

  • Enhanced hypervisor memory isolation mechanisms
  • Improved virtual machine exit handling
  • Strengthened HVCI (Hypervisor-protected Code Integrity) enforcement
  • Updated virtual device security validation

This vulnerability affects systems running Hyper-V and could potentially compromise host system security from guest VMs.

Validation

Installation

Installation

KB5087420 is available through multiple deployment channels:

Windows Update

The update is automatically delivered to Windows 11 Version 23H2 systems through Windows Update. Installation typically occurs during the next scheduled update check or can be initiated manually through Settings > Windows Update > Check for updates.

Microsoft Update Catalog

Manual download is available from the Microsoft Update Catalog for enterprise deployment scenarios. The update packages are:

  • Windows 11 Version 23H2 for x64-based Systems: Approximately 485 MB
  • Windows 11 Version 23H2 for ARM64-based Systems: Approximately 445 MB

Enterprise Deployment

The update is available through Windows Server Update Services (WSUS), System Center Configuration Manager (SCCM), and Microsoft Intune for managed environments. IT administrators can deploy the update using existing patch management workflows.

Prerequisites

No specific prerequisites are required for this update. However, systems must be running Windows 11 Version 23H2 with build 22631.3447 or later. A system restart is required to complete the installation.

Note: The update process may take 15-30 minutes depending on system configuration and hardware specifications.
If it still fails

Known Issues

Known Issues

Microsoft has identified the following known issues with KB5087420:

ARM64 Performance Impact

Some ARM64-based systems may experience temporary performance degradation during the first 24 hours after installation while system optimization processes complete. This is expected behavior and performance should return to normal automatically.

Third-Party Antivirus Compatibility

Certain third-party antivirus solutions may temporarily flag system files as suspicious immediately after installation. This typically resolves within 2-4 hours as antivirus vendors update their definitions.

Hyper-V Virtual Machine Startup Delays

Systems running Hyper-V may experience slightly longer virtual machine startup times (5-10 seconds additional) due to enhanced security validation. This behavior is expected and does not indicate a problem.

Workarounds

If experiencing issues after installation:

  • For ARM64 performance issues: Allow 24 hours for automatic optimization to complete
  • For antivirus false positives: Update antivirus definitions or temporarily disable real-time scanning during the first few hours
  • For Hyper-V startup delays: No action required, this is expected behavior
Important: Do not attempt to uninstall this security update as it addresses critical vulnerabilities. Contact Microsoft Support if persistent issues occur.

Frequently Asked Questions

What does KB5087420 resolve?+
KB5087420 resolves six critical security vulnerabilities in Windows 11 Version 23H2, including Windows Kernel elevation of privilege issues (CVE-2026-0187, CVE-2026-0188), Remote Desktop Services remote code execution vulnerability (CVE-2026-0189), Microsoft Edge WebView2 memory corruption issues (CVE-2026-0190, CVE-2026-0191), Windows Graphics Component information disclosure (CVE-2026-0192), Windows Print Spooler privilege escalation (CVE-2026-0193), and Windows Hyper-V security feature bypass (CVE-2026-0194).
Which systems require KB5087420?+
KB5087420 applies to Windows 11 Version 23H2 for both x64-based and ARM64-based systems. The update is required for all editions including Home, Pro, Enterprise, and Education. Systems must be running build 22631.3447 or later to install this update.
Is KB5087420 a security update?+
Yes, KB5087420 is a comprehensive security update that addresses multiple critical and important vulnerabilities across core Windows components. It includes fixes for remote code execution, elevation of privilege, information disclosure, and security feature bypass vulnerabilities that could compromise system security.
What are the prerequisites for KB5087420?+
No specific prerequisites are required for KB5087420. Systems must be running Windows 11 Version 23H2 with build 22631.3447 or later. The update requires approximately 485 MB of free disk space for x64 systems or 445 MB for ARM64 systems, and a system restart is mandatory to complete installation.
Are there known issues with KB5087420?+
Known issues include temporary performance degradation on ARM64 systems for up to 24 hours post-installation, potential false positives from third-party antivirus software for 2-4 hours, and slightly longer Hyper-V virtual machine startup times (5-10 seconds additional) due to enhanced security validation. These issues typically resolve automatically without intervention.

References (3)

Discussion

Share your thoughts and insights

Sign in to join the discussion