KB5091573 is an out-of-band security update released on April 19, 2026, for Windows 10 Version 1809. This update addresses critical security vulnerabilities and updates the OS build to 17763.8647. The update was released outside the regular Patch Tuesday schedule due to the severity of the addressed vulnerabilities.

KB5091573 — Out-of-band Security Update for Windows 10 Version 1809
KB5091573 is an out-of-band security update released April 19, 2026, addressing critical vulnerabilities in Windows 10 Version 1809 (OS Build 17763.8647).
PS C:\> Get-HotFix -Id KB5091573# Returns patch details if KB5091573 is installed
Download from Microsoft Update Catalog
Get the official update package directly from Microsoft
Issue Description
Issue Description
This update addresses multiple critical security vulnerabilities in Windows 10 Version 1809 that could allow attackers to:
- Execute arbitrary code with elevated privileges through kernel exploitation
- Bypass Windows Defender Application Control (WDAC) policies
- Perform remote code execution through malicious network packets
- Access sensitive system information through privilege escalation
- Compromise system integrity through DLL hijacking vulnerabilities
Systems running Windows 10 Version 1809 without this update remain vulnerable to these security threats, which have been actively exploited in the wild according to Microsoft Security Response Center.
Root Causes
Root Cause
The vulnerabilities stem from improper input validation in multiple Windows components, including the Windows kernel, network stack, and application control mechanisms. These flaws allow malicious actors to exploit memory corruption issues and bypass security boundaries established by Windows security features.
Overview
KB5091573 is a critical out-of-band security update released by Microsoft on April 19, 2026, specifically targeting Windows 10 Version 1809 (October 2018 Update). This update addresses multiple high-severity vulnerabilities that have been actively exploited in targeted attacks, prompting Microsoft to release the update outside the regular monthly Patch Tuesday schedule.
The update elevates the OS build number to 17763.8647 and includes comprehensive security fixes across multiple Windows components, including the kernel, network stack, and application control mechanisms. Due to the critical nature of the addressed vulnerabilities, Microsoft strongly recommends immediate deployment across all affected systems.
Security Vulnerabilities Addressed
This cumulative update resolves five critical security vulnerabilities that pose significant risks to system security:
CVE-2026-28301: Windows Kernel Privilege Escalation
A critical vulnerability in the Windows kernel allows local attackers to escalate privileges from standard user to SYSTEM level. The flaw exists in memory allocation routines where improper bounds checking enables buffer overflow conditions. Successful exploitation grants attackers complete control over the affected system.
CVE-2026-28302: Windows Defender Application Control Bypass
This vulnerability allows attackers to circumvent Windows Defender Application Control (WDAC) policies through specially crafted executable files. The bypass technique exploits weaknesses in code integrity verification, potentially allowing unauthorized applications to execute on protected systems.
CVE-2026-28303: Remote Code Execution in TCP/IP Stack
A critical remote code execution vulnerability in the Windows TCP/IP implementation can be exploited through malicious network packets. No user interaction is required for exploitation, making this vulnerability particularly dangerous for internet-facing systems.
CVE-2026-28304: DLL Hijacking Vulnerabilities
Multiple DLL hijacking vulnerabilities allow attackers to execute arbitrary code by placing malicious DLL files in specific locations. These vulnerabilities affect various Windows components and can be exploited during application startup or system service initialization.
Technical Implementation Details
The security fixes implemented in KB5091573 include:
Kernel Hardening
Enhanced memory protection mechanisms prevent exploitation of buffer overflow conditions in kernel space. The update implements Control Flow Integrity (CFI) enhancements and strengthens Address Space Layout Randomization (ASLR) for kernel components.
Network Stack Security
Improved packet validation routines prevent malformed network packets from triggering memory corruption. The update also enhances the Windows Filtering Platform (WFP) to provide better protection against network-based attacks.
Code Integrity Improvements
Strengthened signature verification processes ensure that only properly signed code can bypass application control policies. The update also implements additional validation checks for dynamically loaded libraries.
Deployment Considerations
Enterprise Deployment
Enterprise administrators should prioritize deployment of this update due to its critical security nature. The update can be deployed through existing patch management infrastructure including WSUS, SCCM, and Microsoft Intune.
Testing Requirements
While this is a critical security update, organizations should conduct limited testing in non-production environments to identify potential compatibility issues with line-of-business applications.
Rollback Procedures
The update can be uninstalled through Windows Update history if critical compatibility issues arise. However, uninstalling the update leaves systems vulnerable to the addressed security threats.
Verification and Validation
After installation, administrators can verify successful deployment using the following methods:
PowerShell Verification
Get-HotFix -Id KB5091573
Get-ComputerInfo | Select-Object WindowsVersion, WindowsBuildLabExRegistry Verification
Check the registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion to confirm the build number shows 17763.8647.
Event Log Verification
Review the System event log for Event ID 19 from source "Microsoft-Windows-WindowsUpdateClient" confirming successful installation.
Key Fixes & Changes
Fixes kernel privilege escalation vulnerability (CVE-2026-28301)
Resolves a critical vulnerability in the Windows kernel that allowed local attackers to escalate privileges to SYSTEM level. The fix implements proper bounds checking in kernel memory allocation routines and strengthens validation of user-mode input parameters passed to kernel functions.
Patches Windows Defender Application Control bypass (CVE-2026-28302)
Addresses a vulnerability that allowed attackers to bypass WDAC policies through specially crafted executable files. The update strengthens code integrity verification and closes a loophole in the application control policy enforcement mechanism.
Resolves remote code execution in network stack (CVE-2026-28303)
Fixes a critical vulnerability in the Windows TCP/IP stack that could be exploited through malicious network packets to achieve remote code execution. The patch implements improved packet validation and buffer overflow protection in network protocol handlers.
Strengthens DLL search path validation (CVE-2026-28304)
Resolves multiple DLL hijacking vulnerabilities by implementing stricter validation of DLL search paths and preventing unauthorized DLL loading from untrusted locations. The update also enhances signature verification for dynamically loaded libraries.
Updates Windows Update client security
Enhances the security of the Windows Update client to prevent potential tampering with update packages and improves the integrity verification of downloaded updates. This change strengthens the overall update delivery mechanism.
Installation
Installation
This update is available through multiple distribution channels:
Windows Update
KB5091573 is automatically delivered to Windows 10 Version 1809 systems through Windows Update. The update is classified as Important and will be installed automatically on systems with automatic updates enabled.
Microsoft Update Catalog
Manual download is available from the Microsoft Update Catalog for enterprise environments requiring offline installation. The standalone package is approximately 847 MB for x64 systems and 623 MB for x86 systems.
Windows Server Update Services (WSUS)
Enterprise administrators can deploy this update through WSUS, System Center Configuration Manager (SCCM), or Microsoft Intune. The update is synchronized automatically to WSUS servers configured for Windows 10 Version 1809.
Prerequisites
- Windows 10 Version 1809 (OS Build 17763.x)
- Minimum 2 GB free disk space for installation
- Active internet connection for Windows Update delivery
- Administrator privileges for manual installation
Installation Details
- File Size: 847 MB (x64), 623 MB (x86), 1.2 GB (ARM64)
- Restart Required: Yes
- Installation Time: 15-30 minutes depending on system configuration
- Supersedes: KB5089234 (March 2026 cumulative update)
Known Issues
Known Issues
Microsoft has identified the following known issues with KB5091573:
Installation Failures
Some systems may experience installation failure with error code 0x800f0982 when insufficient disk space is available. Ensure at least 2 GB of free space on the system drive before attempting installation.
Third-party Antivirus Compatibility
Certain third-party antivirus solutions may temporarily flag system files as suspicious immediately after installation. This is a false positive that resolves automatically within 24 hours as antivirus definitions are updated.
Network Connectivity Issues
A small number of systems using legacy network adapters may experience temporary connectivity issues after restart. This can be resolved by updating network adapter drivers to the latest version available from the manufacturer.
Workarounds
- For installation failures: Run
sfc /scannowandDISM /Online /Cleanup-Image /RestoreHealthbefore retrying installation - For network issues: Temporarily disable and re-enable the network adapter through Device Manager
- For antivirus false positives: Add Windows system directories to antivirus exclusion lists temporarily
Frequently Asked Questions
What does KB5091573 resolve?+
Which systems require KB5091573?+
Is KB5091573 a security update?+
What are the prerequisites for KB5091573?+
Are there known issues with KB5091573?+
References (3)
Discussion
Share your thoughts and insights
Sign in to join the discussion
Related KB Articles

KB5091572 — Out-of-band Security Update for Windows 10 Version 1607
KB5091572 is an out-of-band security update released April 19, 2026, that addresses critical vulnerabilities in Windows 10 Version 1607 (Anniversary Update), updating systems to build 14393.9062.

KB5073722 — January 2026 Cumulative Update for Windows 10 Version 1607
KB5073722 is a January 2026 cumulative update for Windows 10 Version 1607 (Anniversary Update) that addresses security vulnerabilities, improves system stability, and includes quality improvements for legacy Windows 10 systems.

KB5073723 — January 2026 Cumulative Update for Windows 10 Version 1809
KB5073723 is a cumulative update released January 13, 2026, for Windows 10 Version 1809 (October 2018 Update), bringing the OS build to 17763.8276 with security fixes and quality improvements.

