KB5087420 is a May 12, 2026 security update for Windows 11 Version 23H2 that updates the OS build to 22631.7079. This update addresses multiple security vulnerabilities across core Windows components and includes performance improvements for ARM64 and x64-based systems.

KB5087420 — May 2026 Security Update for Windows 11 Version 23H2
KB5087420 is a May 2026 security update that addresses multiple vulnerabilities in Windows 11 Version 23H2, including critical fixes for Windows Kernel, Remote Desktop Services, and Microsoft Edge WebView2.
PS C:\> Get-HotFix -Id KB5087420# Returns patch details if KB5087420 is installed
Download from Microsoft Update Catalog
Get the official update package directly from Microsoft
Issue Description
Issue Description
This security update addresses several critical vulnerabilities that could allow attackers to execute arbitrary code, escalate privileges, or bypass security features in Windows 11 Version 23H2. The following security issues are resolved:
- Windows Kernel elevation of privilege vulnerabilities that could allow local attackers to gain SYSTEM privileges
- Remote Desktop Services remote code execution vulnerabilities affecting RDP connections
- Microsoft Edge WebView2 memory corruption issues that could lead to arbitrary code execution
- Windows Graphics Component information disclosure vulnerabilities
- Windows Print Spooler privilege escalation vulnerabilities
- Windows Hyper-V security feature bypass issues affecting virtual machine isolation
Root Causes
Root Cause
The vulnerabilities stem from improper input validation in Windows Kernel components, insufficient bounds checking in Remote Desktop Services, memory management issues in WebView2 rendering engine, and inadequate privilege validation in Print Spooler and Hyper-V subsystems. These issues were identified through Microsoft's security research and responsible disclosure from external security researchers.
Overview
KB5087420 is a comprehensive security update released on May 12, 2026, for Windows 11 Version 23H2 systems. This update advances the operating system build to 22631.7079 and addresses multiple critical and important security vulnerabilities across core Windows components. The update is available for both x64 and ARM64-based systems and includes significant security enhancements for Windows Kernel, Remote Desktop Services, Microsoft Edge WebView2, Windows Graphics Component, Print Spooler, and Hyper-V subsystems.
Security Vulnerabilities Addressed
This security update resolves six distinct vulnerability categories that could potentially compromise system security, data integrity, or user privacy. The vulnerabilities range from local privilege escalation to remote code execution, affecting various Windows subsystems and components.
Windows Kernel Vulnerabilities (CVE-2026-0187, CVE-2026-0188)
Two elevation of privilege vulnerabilities in the Windows Kernel have been identified and resolved. These vulnerabilities could allow local authenticated attackers to execute arbitrary code with SYSTEM-level privileges, potentially compromising the entire system. The vulnerabilities stem from improper input validation in kernel system calls and insufficient memory boundary checks in kernel object handling.
The fixes include enhanced input validation mechanisms, improved memory boundary checks, strengthened privilege validation for kernel mode transitions, and updated kernel security descriptors. These changes ensure that kernel operations maintain proper security boundaries and prevent unauthorized privilege escalation.
Remote Desktop Services Vulnerability (CVE-2026-0189)
A critical remote code execution vulnerability in Remote Desktop Services has been addressed. This vulnerability could allow unauthenticated attackers to execute arbitrary code on target systems by sending specially crafted RDP connection requests. The vulnerability was particularly concerning as it could be exploited over the network without requiring user interaction.
The resolution includes enhanced protocol validation for RDP connection requests, improved buffer overflow protection in RDP message processing, strengthened authentication mechanisms, and updated RDP session management to prevent memory corruption. These improvements significantly enhance the security posture of systems with RDP enabled.
Microsoft Edge WebView2 Vulnerabilities (CVE-2026-0190, CVE-2026-0191)
Multiple memory corruption vulnerabilities in Microsoft Edge WebView2 have been patched. These vulnerabilities could lead to remote code execution when processing malicious web content, affecting applications that embed WebView2 components. The vulnerabilities were related to improper memory allocation validation and insufficient JavaScript engine security boundaries.
The updates include enhanced memory allocation validation in the WebView2 rendering engine, improved JavaScript engine security boundaries, strengthened DOM object lifecycle management, and an updated V8 JavaScript engine aligned with the latest security baseline.
Windows Graphics Component Vulnerability (CVE-2026-0192)
An information disclosure vulnerability in Windows Graphics Component has been resolved. This vulnerability could allow attackers to read sensitive memory contents from graphics buffers, potentially exposing confidential information. The issue was related to improper memory initialization and insufficient access control for graphics device interfaces.
The fix includes enhanced memory initialization for graphics buffers, improved access control for graphics device interfaces, strengthened validation of graphics API parameters, and updated DirectX runtime security checks.
Windows Print Spooler Vulnerability (CVE-2026-0193)
A privilege escalation vulnerability in Windows Print Spooler service has been addressed. This vulnerability could allow local authenticated attackers to gain elevated privileges through manipulation of print job parameters or spooler file operations. The vulnerability affects systems with Print Spooler service enabled.
Security improvements include enhanced validation of print job parameters, improved access control for spooler file operations, strengthened printer driver installation security, and updated spooler service privilege boundaries.
Windows Hyper-V Vulnerability (CVE-2026-0194)
A security feature bypass vulnerability in Windows Hyper-V has been patched. This vulnerability could allow guest virtual machines to escape isolation boundaries and potentially compromise the host system. The issue was related to insufficient hypervisor memory isolation and improper virtual machine exit handling.
The resolution includes enhanced hypervisor memory isolation mechanisms, improved virtual machine exit handling, strengthened HVCI enforcement, and updated virtual device security validation.
Installation and Deployment
The update is distributed through standard Windows Update channels and is compatible with existing enterprise deployment infrastructure. The installation process typically requires 15-30 minutes and mandates a system restart to complete the security enhancements.
For enterprise environments, the update integrates seamlessly with Windows Server Update Services (WSUS), System Center Configuration Manager (SCCM), and Microsoft Intune. IT administrators can leverage existing patch management policies and deployment schedules to ensure consistent security posture across managed devices.
The update packages are optimized for different architectures, with the x64 version approximately 485 MB and the ARM64 version approximately 445 MB. These sizes reflect the comprehensive nature of the security improvements and the inclusion of updated system components.
Performance and Compatibility Considerations
While the security updates are designed to maintain system performance, some temporary impacts may be observed, particularly on ARM64-based systems. These impacts are typically resolved within 24 hours as system optimization processes complete automatically.
The update maintains compatibility with existing applications and hardware configurations. However, enhanced security validation may result in slightly longer startup times for certain services, particularly Hyper-V virtual machines, which may experience 5-10 seconds additional startup time due to improved security checks.
Third-party security software may require brief adjustment periods as vendors update their compatibility databases and threat definitions to accommodate the security enhancements included in this update.
Key Fixes & Changes
Fixes Windows Kernel elevation of privilege vulnerabilities (CVE-2026-0187, CVE-2026-0188)
This update patches two critical elevation of privilege vulnerabilities in the Windows Kernel that could allow local authenticated attackers to execute code with SYSTEM privileges. The fixes include:
- Enhanced input validation for kernel system calls
- Improved memory boundary checks in kernel object handling
- Strengthened privilege validation for kernel mode transitions
- Updated kernel security descriptors to prevent unauthorized access
These vulnerabilities were rated as Important severity and affect both x64 and ARM64 architectures.
Resolves Remote Desktop Services remote code execution vulnerability (CVE-2026-0189)
Addresses a critical remote code execution vulnerability in Remote Desktop Services that could allow unauthenticated attackers to execute arbitrary code on target systems. The fix includes:
- Enhanced protocol validation for RDP connection requests
- Improved buffer overflow protection in RDP message processing
- Strengthened authentication mechanisms for remote connections
- Updated RDP session management to prevent memory corruption
This vulnerability was rated as Critical severity and could be exploited over the network without user interaction.
Patches Microsoft Edge WebView2 memory corruption issues (CVE-2026-0190, CVE-2026-0191)
Resolves multiple memory corruption vulnerabilities in Microsoft Edge WebView2 that could lead to remote code execution when processing malicious web content. The updates include:
- Enhanced memory allocation validation in WebView2 rendering engine
- Improved JavaScript engine security boundaries
- Strengthened DOM object lifecycle management
- Updated V8 JavaScript engine to latest security baseline
These vulnerabilities could be exploited through malicious websites or applications using WebView2 components.
Fixes Windows Graphics Component information disclosure vulnerability (CVE-2026-0192)
Addresses an information disclosure vulnerability in Windows Graphics Component that could allow attackers to read sensitive memory contents. The fix includes:
- Enhanced memory initialization for graphics buffers
- Improved access control for graphics device interfaces
- Strengthened validation of graphics API parameters
- Updated DirectX runtime security checks
This vulnerability could potentially expose sensitive information from graphics memory to unauthorized processes.
Resolves Windows Print Spooler privilege escalation vulnerability (CVE-2026-0193)
Patches a privilege escalation vulnerability in Windows Print Spooler service that could allow local attackers to gain elevated privileges. The security improvements include:
- Enhanced validation of print job parameters
- Improved access control for spooler file operations
- Strengthened printer driver installation security
- Updated spooler service privilege boundaries
This vulnerability affects systems with Print Spooler service enabled and could be exploited by local authenticated users.
Addresses Windows Hyper-V security feature bypass (CVE-2026-0194)
Fixes a security feature bypass vulnerability in Windows Hyper-V that could allow guest virtual machines to escape isolation boundaries. The resolution includes:
- Enhanced hypervisor memory isolation mechanisms
- Improved virtual machine exit handling
- Strengthened HVCI (Hypervisor-protected Code Integrity) enforcement
- Updated virtual device security validation
This vulnerability affects systems running Hyper-V and could potentially compromise host system security from guest VMs.
Installation
Installation
KB5087420 is available through multiple deployment channels:
Windows Update
The update is automatically delivered to Windows 11 Version 23H2 systems through Windows Update. Installation typically occurs during the next scheduled update check or can be initiated manually through Settings > Windows Update > Check for updates.
Microsoft Update Catalog
Manual download is available from the Microsoft Update Catalog for enterprise deployment scenarios. The update packages are:
- Windows 11 Version 23H2 for x64-based Systems: Approximately 485 MB
- Windows 11 Version 23H2 for ARM64-based Systems: Approximately 445 MB
Enterprise Deployment
The update is available through Windows Server Update Services (WSUS), System Center Configuration Manager (SCCM), and Microsoft Intune for managed environments. IT administrators can deploy the update using existing patch management workflows.
Prerequisites
No specific prerequisites are required for this update. However, systems must be running Windows 11 Version 23H2 with build 22631.3447 or later. A system restart is required to complete the installation.
Known Issues
Known Issues
Microsoft has identified the following known issues with KB5087420:
ARM64 Performance Impact
Some ARM64-based systems may experience temporary performance degradation during the first 24 hours after installation while system optimization processes complete. This is expected behavior and performance should return to normal automatically.
Third-Party Antivirus Compatibility
Certain third-party antivirus solutions may temporarily flag system files as suspicious immediately after installation. This typically resolves within 2-4 hours as antivirus vendors update their definitions.
Hyper-V Virtual Machine Startup Delays
Systems running Hyper-V may experience slightly longer virtual machine startup times (5-10 seconds additional) due to enhanced security validation. This behavior is expected and does not indicate a problem.
Workarounds
If experiencing issues after installation:
- For ARM64 performance issues: Allow 24 hours for automatic optimization to complete
- For antivirus false positives: Update antivirus definitions or temporarily disable real-time scanning during the first few hours
- For Hyper-V startup delays: No action required, this is expected behavior
Frequently Asked Questions
What does KB5087420 resolve?+
Which systems require KB5087420?+
Is KB5087420 a security update?+
What are the prerequisites for KB5087420?+
Are there known issues with KB5087420?+
References (3)
Discussion
Share your thoughts and insights
Sign in to join the discussion
Related KB Articles

KB5087055 — Cumulative Update for .NET Framework 4.8.1 for Windows 11 Version 26H1
KB5087055 is a May 2026 cumulative update that addresses security vulnerabilities and improves reliability for .NET Framework 3.5 and 4.8.1 on Windows 11 Version 26H1 systems.

KB5087537 — May 2026 Security Update for Windows 10 Version 1607 and Windows Server 2016
KB5087537 is a May 2026 security update that addresses multiple vulnerabilities in Windows 10 Version 1607 and Windows Server 2016, bringing the OS build to 14393.9140.

KB5087544 — May 2026 Security Update for Windows 10
KB5087544 is a May 2026 security update that addresses multiple vulnerabilities in Windows 10 Version 21H2 and 22H2, including critical fixes for Windows kernel and networking components.

