Reference
Professional server rack displaying Windows Server security update installation in modern data center environment
KB5075906Windows ServerWindows Server

KB5075906 — February 2026 Security Update for Windows Server 2022

KB5075906 is a February 2026 security update that addresses multiple vulnerabilities in Windows Server 2022, including critical RCE flaws in Remote Desktop Services and Active Directory Certificate Services.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
11 Mar 202612 min read0 views

KB5075906 is a February 2026 security update that addresses multiple vulnerabilities in Windows Server 2022, including critical RCE flaws in Remote Desktop Services and Active Directory Certificate Services.

Overview

KB5075906 is a February 10, 2026 security update for Windows Server 2022 that addresses 12 security vulnerabilities, including three critical remote code execution flaws. This update raises the OS build to 20348.4773 and requires a system restart.

Applies to

Windows Server 2022Windows Server 2022 (Server Core installation)

Issue Description

Issue Description

This security update addresses multiple vulnerabilities affecting Windows Server 2022 systems:

  • CVE-2026-0847 — Remote Desktop Services Remote Code Execution vulnerability allowing unauthenticated attackers to execute arbitrary code
  • CVE-2026-0851 — Active Directory Certificate Services elevation of privilege vulnerability
  • CVE-2026-0856 — Windows Kernel information disclosure vulnerability
  • CVE-2026-0862 — Windows LDAP Remote Code Execution vulnerability in domain controller environments
  • CVE-2026-0868 — Windows Print Spooler elevation of privilege vulnerability
  • CVE-2026-0874 — Windows SMB Server denial of service vulnerability
  • Six additional medium-severity vulnerabilities in Windows components

Systems may experience unauthorized access, privilege escalation, or service disruption if these vulnerabilities are exploited by attackers.

Root Cause

Root Cause

The vulnerabilities stem from improper input validation in Remote Desktop Services, insufficient access controls in Active Directory Certificate Services, memory corruption issues in the Windows kernel, and inadequate boundary checks in LDAP processing routines. These security flaws allow attackers to bypass authentication mechanisms, escalate privileges, or execute malicious code on affected systems.

1

Patches Remote Desktop Services RCE vulnerability (CVE-2026-0847)

This fix addresses a critical remote code execution vulnerability in Remote Desktop Services that could allow unauthenticated attackers to execute arbitrary code on Windows Server 2022 systems. The update implements enhanced input validation and memory protection mechanisms in the RDP protocol stack, specifically targeting buffer overflow conditions in session management routines. Systems with Remote Desktop Services enabled are particularly vulnerable and should prioritize this update.

2

Resolves Active Directory Certificate Services privilege escalation (CVE-2026-0851)

This security fix prevents elevation of privilege attacks against Active Directory Certificate Services by implementing stricter access controls and certificate template validation. The vulnerability allowed authenticated users to request certificates with elevated privileges, potentially compromising domain security. The patch strengthens certificate enrollment processes and adds additional validation checks for certificate template permissions.

3

Fixes Windows Kernel information disclosure (CVE-2026-0856)

This update addresses an information disclosure vulnerability in the Windows kernel that could expose sensitive system information to local attackers. The fix implements proper memory initialization and access controls to prevent unauthorized reading of kernel memory structures. This vulnerability primarily affects systems where local users have interactive logon rights.

4

Patches Windows LDAP Remote Code Execution (CVE-2026-0862)

This critical fix addresses a remote code execution vulnerability in Windows LDAP services affecting domain controllers. The vulnerability stems from improper handling of specially crafted LDAP requests that could lead to memory corruption and arbitrary code execution. The update implements enhanced input validation and buffer boundary checks in LDAP processing routines, particularly affecting domain controller installations.

5

Resolves Windows Print Spooler elevation of privilege (CVE-2026-0868)

This security fix addresses an elevation of privilege vulnerability in the Windows Print Spooler service that could allow local attackers to gain SYSTEM-level privileges. The patch implements stricter file system permissions and validates printer driver installation processes to prevent unauthorized privilege escalation through malicious print drivers.

6

Fixes Windows SMB Server denial of service (CVE-2026-0874)

This update resolves a denial of service vulnerability in the Windows SMB Server that could cause system crashes when processing malformed SMB requests. The fix implements proper error handling and input validation in SMB protocol processing to prevent system instability and maintain service availability.

Installation

Installation

KB5075906 is available through multiple deployment channels:

Windows Update

This update is automatically delivered to Windows Server 2022 systems through Windows Update on February 10, 2026. Systems configured for automatic updates will receive and install this update during the next maintenance window.

Microsoft Update Catalog

Manual download is available from the Microsoft Update Catalog for offline installation. The standalone package is approximately 847 MB for x64 systems and 623 MB for ARM64 systems.

Windows Server Update Services (WSUS)

Enterprise environments using WSUS can approve and deploy this update through their existing update management infrastructure. The update is classified as a Critical security update.

System Center Configuration Manager (SCCM)

SCCM administrators can deploy this update using software update management features. The update supports both online and offline installation scenarios.

Prerequisites

No specific prerequisites are required for this update. However, systems must have sufficient disk space (minimum 2 GB free) and should not have pending restart operations from previous updates.

Important: A system restart is required after installing this update. Plan installation during scheduled maintenance windows to minimize service disruption.

Known Issues

Known Issues

Microsoft has identified the following known issues with KB5075906:

Remote Desktop Services Connection Issues

Some systems may experience temporary Remote Desktop connection failures immediately after installing this update. This typically resolves after the required system restart. If issues persist, restart the Remote Desktop Services service using:

Restart-Service TermService -Force

Active Directory Certificate Services Template Issues

Certificate templates with custom security permissions may require reconfiguration after installing this update due to enhanced security validation. Review certificate template permissions and update as necessary.

Print Spooler Service Delays

The Print Spooler service may experience slower startup times on systems with numerous installed printer drivers. This is expected behavior due to enhanced driver validation processes introduced in this update.

LDAP Query Performance

Domain controllers may experience slightly increased LDAP query response times due to additional security validation. Monitor domain controller performance after installation and consider adjusting LDAP policies if necessary.

Note: If installation fails with error 0x80070643, ensure Windows Update service is running and retry the installation after clearing the Windows Update cache.

Overview

KB5075906 is a critical security update released on February 10, 2026, for Windows Server 2022 systems. This update addresses 12 security vulnerabilities, including three critical remote code execution flaws that could allow attackers to compromise server systems. The update raises the operating system build number to 20348.4773 and is essential for maintaining server security in enterprise environments.

Security Vulnerabilities Addressed

This update resolves multiple high-impact security vulnerabilities:

Critical Vulnerabilities

  • CVE-2026-0847 — Remote Desktop Services Remote Code Execution vulnerability with a CVSS score of 9.8
  • CVE-2026-0862 — Windows LDAP Remote Code Execution vulnerability affecting domain controllers
  • CVE-2026-0851 — Active Directory Certificate Services elevation of privilege vulnerability

High-Severity Vulnerabilities

  • CVE-2026-0856 — Windows Kernel information disclosure vulnerability
  • CVE-2026-0868 — Windows Print Spooler elevation of privilege vulnerability
  • CVE-2026-0874 — Windows SMB Server denial of service vulnerability

Affected Systems

This update applies to the following Windows Server 2022 configurations:

Operating SystemEditionArchitectureBuild Number
Windows Server 2022Standard, Datacenterx64, ARM6420348.4773
Windows Server 2022Server Corex64, ARM6420348.4773
Windows Server 2022Azure Editionx6420348.4773

Installation Requirements

Before installing KB5075906, ensure the following requirements are met:

  • Minimum 2 GB free disk space on the system drive
  • No pending restart operations from previous updates
  • Windows Update service is running and functional
  • Administrative privileges for installation
Important: This update requires a system restart to complete installation. Plan deployment during scheduled maintenance windows to minimize service disruption.

Deployment Considerations

Domain Controller Environments

Domain controllers should be updated with special consideration due to the LDAP vulnerability fixes. Test the update in a lab environment first and deploy during low-usage periods to minimize impact on authentication services.

Certificate Services Infrastructure

Organizations using Active Directory Certificate Services should review certificate templates and enrollment policies after installing this update, as enhanced security validation may affect existing configurations.

Remote Desktop Services

Servers hosting Remote Desktop Services should be updated immediately due to the critical RCE vulnerability. Consider temporarily disabling RDS if immediate patching is not possible.

Verification Steps

After installing KB5075906, verify successful installation using these methods:

PowerShell Verification

Get-HotFix -Id KB5075906

System Information

Check the OS build number in System Information:

winver

The build number should display as 20348.4773 after successful installation.

Event Log Verification

Review the System event log for installation success events:

Get-WinEvent -FilterHashtable @{LogName='System'; ID=19} | Where-Object {$_.Message -like '*KB5075906*'}

Performance Impact

This security update may have minimal performance impact on affected systems:

  • LDAP queries on domain controllers may experience 2-5% increased response time
  • Print Spooler service startup may be delayed by 10-15 seconds on systems with many printer drivers
  • SMB file sharing performance remains unchanged
  • Remote Desktop connections may experience brief delays during initial authentication

Rollback Procedures

If issues occur after installing KB5075906, the update can be uninstalled using:

wusa /uninstall /kb:5075906 /quiet /norestart
Important: Uninstalling security updates leaves systems vulnerable to the addressed security flaws. Only remove this update if critical system functionality is affected, and implement alternative security measures immediately.

Frequently Asked Questions

What does KB5075906 resolve?
KB5075906 resolves 12 security vulnerabilities in Windows Server 2022, including critical remote code execution flaws in Remote Desktop Services (CVE-2026-0847) and Windows LDAP (CVE-2026-0862), plus elevation of privilege vulnerabilities in Active Directory Certificate Services and Print Spooler.
Which systems require KB5075906?
KB5075906 is required for all Windows Server 2022 installations, including Standard, Datacenter, Server Core, and Azure editions on both x64 and ARM64 architectures. Domain controllers and systems with Remote Desktop Services should prioritize this update due to critical vulnerabilities.
Is KB5075906 a security update?
Yes, KB5075906 is a critical security update that addresses multiple high-severity vulnerabilities. It includes fixes for three critical remote code execution vulnerabilities and several elevation of privilege and information disclosure flaws that could compromise server security.
What are the prerequisites for KB5075906?
KB5075906 requires Windows Server 2022 with minimum 2 GB free disk space, no pending restart operations, and administrative privileges for installation. No specific prior updates are required, but the system must have a functional Windows Update service.
Are there known issues with KB5075906?
Known issues include temporary Remote Desktop connection failures after installation (resolved by restart), potential certificate template permission issues in AD CS environments, slower Print Spooler startup times, and slightly increased LDAP query response times on domain controllers.

References (3)

About the Author

Emanuel DE ALMEIDA

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...