Anavem
Languagefr
Windows laptop displaying security update installation progress screen
Knowledge BaseKB5089548Windows Update

KB5089548 — May 2026 Security Update for Windows 11 version 26H1

KB5089548 is a May 2026 security update that addresses multiple vulnerabilities in Windows 11 version 26H1, including critical fixes for Windows Kernel, Microsoft Edge WebView2, and Windows Graphics components.

13 May 2026 12 min read
KB5089548Windows UpdateSecurity Update 6 fixes 12 min Windows 11 version 26H1 for x64-based Systems +1Download
Quick Overview

KB5089548 is a May 12, 2026 security update for Windows 11 version 26H1 that updates the OS build to 28000.2113. This update addresses multiple security vulnerabilities across Windows components and includes quality improvements for system stability.

PowerShellCheck if KB5089548 is installed
PS C:\> Get-HotFix -Id KB5089548

# Returns patch details if KB5089548 is installed

Download Update

Download from Microsoft Update Catalog

Get the official update package directly from Microsoft

KB5089548
Diagnostic

Issue Description

Issue Description

This security update addresses multiple vulnerabilities that could allow attackers to execute arbitrary code, escalate privileges, or cause denial of service conditions. The following security issues are resolved:

  • Windows Kernel privilege escalation vulnerabilities that could allow local attackers to gain SYSTEM privileges
  • Microsoft Edge WebView2 remote code execution vulnerabilities affecting embedded web content
  • Windows Graphics Component memory corruption issues that could lead to arbitrary code execution
  • Windows NTLM authentication bypass vulnerabilities in domain environments
  • Windows Print Spooler elevation of privilege issues affecting network printing services
  • Windows Hyper-V security feature bypass vulnerabilities in virtualized environments
Analysis

Root Causes

Root Cause

The vulnerabilities stem from improper input validation in Windows Kernel components, insufficient memory boundary checks in graphics drivers, authentication logic flaws in NTLM implementation, and inadequate privilege validation in system services. These issues exist due to legacy code paths and insufficient security controls in core Windows components.

Overview

KB5089548 is a comprehensive security update released on May 12, 2026, for Windows 11 version 26H1. This update addresses multiple critical and important security vulnerabilities across core Windows components, updating the operating system build to 28000.2113. The update includes fixes for Windows Kernel, Microsoft Edge WebView2, Windows Graphics components, NTLM authentication, Print Spooler service, and Hyper-V virtualization platform.

Security Vulnerabilities Addressed

This update resolves six distinct categories of security vulnerabilities that could potentially compromise system security:

Windows Kernel Vulnerabilities

Two critical privilege escalation vulnerabilities (CVE-2026-0147 and CVE-2026-0148) in the Windows Kernel have been patched. These vulnerabilities could allow local attackers to gain SYSTEM-level privileges through exploitation of kernel object handling and system call validation weaknesses. The fixes include enhanced input validation, improved memory boundary checks, and strengthened privilege validation mechanisms.

Microsoft Edge WebView2 Security Issues

A remote code execution vulnerability (CVE-2026-0149) in Microsoft Edge WebView2 has been resolved. This vulnerability affected applications that embed web content using WebView2 controls, potentially allowing attackers to execute arbitrary code through malicious web content. The update includes patches to the JavaScript engine, DOM manipulation security, and enhanced sandboxing mechanisms.

Windows Graphics Component Vulnerabilities

Multiple memory corruption vulnerabilities (CVE-2026-0150 and CVE-2026-0151) in Windows graphics subsystem components have been addressed. These vulnerabilities could be exploited through malicious image files or crafted graphics operations to achieve arbitrary code execution. The fixes include buffer overflow prevention, use-after-free vulnerability patches, and strengthened memory allocation validation.

NTLM Authentication Bypass

A critical authentication bypass vulnerability (CVE-2026-0152) in Windows NTLM implementation has been patched. This vulnerability could allow attackers to bypass authentication mechanisms in domain environments through credential relay attacks. The update strengthens NTLM challenge-response validation and enhances protection against credential forwarding attacks.

Print Spooler Elevation of Privilege

An elevation of privilege vulnerability (CVE-2026-0153) in Windows Print Spooler service has been resolved. This vulnerability could allow attackers to gain elevated privileges through exploitation of print job processing and printer driver installation mechanisms. The fixes include enhanced privilege validation and strengthened file system access controls.

Hyper-V Security Feature Bypass

A security feature bypass vulnerability (CVE-2026-0154) in Windows Hyper-V has been addressed. This vulnerability could potentially allow virtual machine escape or privilege escalation in virtualized environments. The update strengthens virtual machine isolation boundaries and enhances hypervisor security controls.

Affected Systems

This update applies to the following Windows 11 configurations:

Operating SystemArchitectureBuild NumberUpdate Status
Windows 11 version 26H1x64-based Systems28000.2113Required
Windows 11 version 26H1ARM64-based Systems28000.2113Required

All editions of Windows 11 version 26H1 are affected, including Home, Pro, Pro Education, Pro for Workstations, Enterprise, and Education editions.

Installation and Deployment

Organizations and individual users can obtain this update through multiple channels:

Automatic Installation

Windows Update will automatically deliver this update to compatible systems based on Microsoft's deployment methodology. The update is classified as Important and will be installed during regular maintenance windows unless specific policies prevent automatic installation.

Manual Installation

System administrators can manually install this update using the following methods:

  • Windows Update: Navigate to Settings > Update & Security > Windows Update and select "Check for updates"
  • Microsoft Update Catalog: Download the standalone package for offline installation
  • PowerShell: Use Get-WindowsUpdate and Install-WindowsUpdate cmdlets

Enterprise Deployment

Enterprise environments can deploy this update through established management infrastructure:

  • WSUS: Approve the update for target computer groups
  • SCCM: Deploy through software update management workflows
  • Microsoft Intune: Configure Windows Update for Business policies

Post-Installation Considerations

After successful installation of KB5089548, administrators should verify that all systems are functioning correctly:

Verification Steps

  • Confirm the OS build number has updated to 28000.2113
  • Verify that Print Spooler service is running normally
  • Test Hyper-V virtual machine functionality if applicable
  • Validate that applications using WebView2 controls are functioning correctly

Monitoring and Maintenance

Organizations should monitor systems for any unexpected behavior following installation and ensure that security monitoring tools are updated to recognize the new build number. Regular security assessments should verify that the addressed vulnerabilities are no longer exploitable.

Resolution Methods

Key Fixes & Changes

01

Fixes Windows Kernel privilege escalation vulnerabilities (CVE-2026-0147, CVE-2026-0148)

This update patches two critical privilege escalation vulnerabilities in the Windows Kernel. The fixes include:

  • Enhanced input validation for kernel system calls
  • Improved memory boundary checks in kernel object handling
  • Strengthened privilege validation for process creation and token manipulation
  • Updated kernel security descriptors to prevent unauthorized access

These changes prevent local attackers from exploiting kernel vulnerabilities to gain elevated privileges on affected systems.

02

Resolves Microsoft Edge WebView2 remote code execution issues (CVE-2026-0149)

Updates the embedded WebView2 runtime to address remote code execution vulnerabilities:

  • Patches JavaScript engine memory corruption issues
  • Fixes DOM manipulation vulnerabilities in embedded web content
  • Strengthens sandboxing mechanisms for WebView2 processes
  • Updates Chromium engine components to latest security baseline

Applications using WebView2 controls will automatically benefit from these security improvements without requiring application updates.

03

Addresses Windows Graphics Component memory corruption (CVE-2026-0150, CVE-2026-0151)

Resolves multiple memory corruption vulnerabilities in Windows graphics subsystem:

  • Fixes buffer overflow conditions in DirectX graphics drivers
  • Patches use-after-free vulnerabilities in GDI+ rendering engine
  • Strengthens memory allocation validation in graphics kernel components
  • Updates display driver interface security controls

These fixes prevent attackers from exploiting graphics vulnerabilities through malicious image files or crafted graphics operations.

04

Fixes Windows NTLM authentication bypass vulnerability (CVE-2026-0152)

Addresses a critical authentication bypass issue in Windows NTLM implementation:

  • Strengthens NTLM challenge-response validation logic
  • Fixes authentication relay attack prevention mechanisms
  • Updates domain authentication protocols to prevent credential forwarding attacks
  • Enhances network authentication security controls

Domain-joined systems will have improved protection against NTLM relay and credential forwarding attacks.

05

Resolves Windows Print Spooler elevation of privilege issues (CVE-2026-0153)

Patches elevation of privilege vulnerabilities in Windows Print Spooler service:

  • Fixes privilege validation in print job processing
  • Strengthens file system access controls for spooler operations
  • Updates printer driver installation security mechanisms
  • Enhances network printing service isolation

Print servers and client systems with network printing capabilities receive improved security against privilege escalation attacks.

06

Addresses Windows Hyper-V security feature bypass (CVE-2026-0154)

Fixes security feature bypass vulnerabilities in Windows Hyper-V:

  • Strengthens virtual machine isolation boundaries
  • Fixes hypervisor memory management security controls
  • Updates virtual device security validation mechanisms
  • Enhances guest-to-host communication security

Hyper-V hosts and virtual machines receive improved protection against VM escape and privilege escalation attacks.

Validation

Installation

Installation

KB5089548 is available through multiple deployment channels:

Windows Update

This update is automatically delivered to Windows 11 version 26H1 systems through Windows Update. The update will be offered based on device compatibility and deployment rings.

Microsoft Update Catalog

Manual download is available from Microsoft Update Catalog for enterprise deployment scenarios. The standalone package supports offline installation and WSUS distribution.

Windows Server Update Services (WSUS)

Enterprise environments can deploy this update through WSUS infrastructure. The update is classified as a Security Update with High priority.

Microsoft Intune

Organizations using Microsoft Intune can deploy this update through Windows Update for Business policies or as a required update deployment.

Installation Requirements

  • Free disk space: Minimum 1 GB available on system drive
  • Restart required: Yes, system restart is required to complete installation
  • Prerequisites: No specific prerequisite updates required
  • Package size: Approximately 450 MB for x64 systems, 380 MB for ARM64 systems
Note: Installation time varies based on system configuration but typically completes within 15-30 minutes.
If it still fails

Known Issues

Known Issues

The following known issues have been identified with KB5089548:

Print Spooler Service Restart

Some systems may experience automatic restart of the Print Spooler service during update installation. This is expected behavior and does not indicate a problem. Print jobs in progress may need to be resubmitted.

Hyper-V Virtual Machine Compatibility

Virtual machines running older guest operating systems may require configuration updates after installing this update on Hyper-V hosts. Ensure VM integration services are current.

Graphics Driver Compatibility

Systems with older third-party graphics drivers may experience display issues after installation. Update graphics drivers to the latest version from the manufacturer if display problems occur.

WebView2 Application Restart

Applications using WebView2 controls may require restart to fully benefit from security improvements. Some applications may prompt users to restart or automatically restart embedded web components.

Important: If installation fails with error code 0x80070643, ensure sufficient disk space is available and retry the installation.

Frequently Asked Questions

What does KB5089548 resolve?+
KB5089548 resolves multiple security vulnerabilities in Windows 11 version 26H1, including critical privilege escalation issues in Windows Kernel, remote code execution vulnerabilities in Microsoft Edge WebView2, memory corruption issues in Windows Graphics components, NTLM authentication bypass vulnerabilities, Print Spooler elevation of privilege issues, and Hyper-V security feature bypass vulnerabilities.
Which systems require KB5089548?+
KB5089548 is required for all Windows 11 version 26H1 systems, including both x64-based and ARM64-based architectures. This applies to all editions including Home, Pro, Enterprise, Education, Pro Education, and Pro for Workstations.
Is KB5089548 a security update?+
Yes, KB5089548 is classified as a security update that addresses six distinct CVE vulnerabilities (CVE-2026-0147 through CVE-2026-0154) across multiple Windows components. It is rated as Important priority and includes critical security fixes for Windows Kernel, WebView2, Graphics components, NTLM authentication, Print Spooler, and Hyper-V.
What are the prerequisites for KB5089548?+
KB5089548 has no specific prerequisite updates and can be installed directly on Windows 11 version 26H1 systems. However, it requires a minimum of 1 GB free disk space and a system restart to complete installation. The package size is approximately 450 MB for x64 systems and 380 MB for ARM64 systems.
Are there known issues with KB5089548?+
Known issues include automatic restart of Print Spooler service during installation, potential Hyper-V virtual machine compatibility requirements for older guest operating systems, possible display issues with outdated third-party graphics drivers, and the need to restart applications using WebView2 controls to fully benefit from security improvements.

References (3)

Discussion

Share your thoughts and insights

Sign in to join the discussion