KB5075943 is a February 10, 2026 security hotpatch update for Windows Server 2022 that updates the OS build to 20348.4711. This hotpatch addresses multiple security vulnerabilities and can be installed without requiring a system restart, minimizing downtime for production servers.

KB5075943 — February 2026 Security Hotpatch for Windows Server 2022
KB5075943 is a February 2026 security hotpatch update for Windows Server 2022 that addresses critical vulnerabilities and security issues without requiring a system restart.
KB5075943 is a February 2026 security hotpatch update for Windows Server 2022 that addresses critical vulnerabilities and security issues without requiring a system restart.
In This Article
- Issue Description
- Root Cause
- 1Patches remote code execution vulnerabilities in Windows Server components
- 2Resolves elevation of privilege vulnerabilities in Windows kernel
- 3Fixes information disclosure vulnerabilities in networking stack
- 4Strengthens Windows authentication security mechanisms
- 5Addresses denial of service vulnerabilities in server services
- Installation
- Known Issues
- Frequently Asked Questions
Applies to
Issue Description
Issue Description
This hotpatch update addresses several security vulnerabilities and issues affecting Windows Server 2022 systems:
- Remote code execution vulnerabilities in Windows Server components
- Elevation of privilege vulnerabilities in Windows kernel
- Information disclosure vulnerabilities in Windows networking stack
- Security bypass vulnerabilities in Windows authentication mechanisms
- Denial of service vulnerabilities in Windows Server services
Without this update, Windows Server 2022 systems remain vulnerable to potential security exploits that could compromise server integrity, confidentiality, and availability.
Root Cause
Root Cause
The vulnerabilities addressed by KB5075943 stem from insufficient input validation, improper memory handling, and inadequate security checks in various Windows Server 2022 components. These security flaws could allow attackers to execute arbitrary code, escalate privileges, or bypass security mechanisms on affected systems.
Patches remote code execution vulnerabilities in Windows Server components
This hotpatch addresses critical remote code execution vulnerabilities in Windows Server 2022 core components. The update strengthens input validation and memory handling mechanisms to prevent exploitation of buffer overflow and memory corruption vulnerabilities. These fixes apply to Windows Server services, networking components, and system libraries that could be targeted by remote attackers.
Resolves elevation of privilege vulnerabilities in Windows kernel
The update patches several elevation of privilege vulnerabilities in the Windows kernel that could allow local attackers to gain SYSTEM-level access. These fixes include improved privilege checks, enhanced security boundaries, and corrected access control mechanisms in kernel-mode drivers and system services.
Fixes information disclosure vulnerabilities in networking stack
This hotpatch addresses information disclosure vulnerabilities in the Windows networking stack that could allow attackers to access sensitive information from server memory. The fixes include improved memory initialization, enhanced data sanitization, and strengthened network protocol handling to prevent information leakage.
Strengthens Windows authentication security mechanisms
The update resolves security bypass vulnerabilities in Windows authentication mechanisms, including improvements to Kerberos authentication, NTLM protocol handling, and certificate validation processes. These fixes prevent attackers from bypassing authentication controls and gaining unauthorized access to server resources.
Addresses denial of service vulnerabilities in server services
This hotpatch fixes denial of service vulnerabilities in various Windows Server services that could be exploited to cause system instability or service unavailability. The fixes include improved resource management, enhanced error handling, and strengthened input validation in server components.
Installation
Installation
KB5075943 is delivered automatically through Windows Update for Windows Server 2022 systems with automatic updates enabled. The hotpatch is also available through the following channels:
- Windows Update: Automatic delivery begins February 10, 2026
- Microsoft Update Catalog: Available for manual download and deployment
- Windows Server Update Services (WSUS): Available for enterprise deployment
- Microsoft Endpoint Configuration Manager: Distributed through software update management
- Azure Update Management: Available for Azure-hosted Windows Server 2022 VMs
Prerequisites:
- Windows Server 2022 with latest servicing stack update installed
- Minimum 500 MB free disk space for installation
- Administrative privileges required for installation
File Size: Approximately 45 MB
Restart Required: No (hotpatch technology)
Known Issues
Known Issues
Microsoft has identified the following known issues with KB5075943:
- Hyper-V Integration Services: Some third-party Hyper-V integration services may require restart after hotpatch installation to function properly
- Custom kernel drivers: Systems with unsigned or custom kernel drivers may experience compatibility issues. Ensure all drivers are properly signed and compatible
- Windows Server Backup: Backup operations in progress during hotpatch installation may need to be restarted
Workarounds:
- For Hyper-V integration issues, restart the affected virtual machines after hotpatch installation
- Update or remove incompatible kernel drivers before installing the hotpatch
- Schedule backup operations outside of maintenance windows when hotpatches are applied
Overview
KB5075943 is a critical security hotpatch update released on February 10, 2026, for Windows Server 2022 systems. This update advances the operating system build to 20348.4711 and addresses multiple high-priority security vulnerabilities without requiring a system restart. The hotpatch technology allows production servers to receive critical security fixes while maintaining continuous operation and minimizing service disruption.
Security Vulnerabilities Addressed
This hotpatch update resolves several categories of security vulnerabilities that could potentially compromise Windows Server 2022 systems:
Remote Code Execution Vulnerabilities
The update patches critical remote code execution flaws in Windows Server components that could allow attackers to execute arbitrary code on target systems. These vulnerabilities affect core server services, networking components, and system libraries. The fixes implement enhanced input validation, improved memory handling, and strengthened security boundaries to prevent exploitation.
Privilege Escalation Issues
Several elevation of privilege vulnerabilities in the Windows kernel are addressed by this hotpatch. These flaws could allow local attackers to gain SYSTEM-level access and compromise server security. The fixes include improved privilege checks, enhanced access control mechanisms, and corrected security boundaries in kernel-mode components.
Information Disclosure Vulnerabilities
The update resolves information disclosure vulnerabilities in the Windows networking stack that could expose sensitive server information to unauthorized parties. These fixes implement proper memory initialization, enhanced data sanitization, and improved network protocol handling to prevent information leakage.
Authentication Security Enhancements
Security bypass vulnerabilities in Windows authentication mechanisms are patched, including improvements to Kerberos authentication, NTLM protocol handling, and certificate validation processes. These enhancements prevent attackers from bypassing authentication controls and gaining unauthorized access to server resources.
Affected Systems
KB5075943 applies to the following Windows Server 2022 configurations:
| Operating System | Edition | Architecture | Build |
|---|---|---|---|
| Windows Server 2022 | Standard, Datacenter | x64 | 20348.x |
| Windows Server 2022 | Server Core | x64 | 20348.x |
| Windows Server 2022 | Azure Edition | x64 | 20348.x |
Hotpatch Technology Benefits
This update utilizes Microsoft's hotpatch technology, which provides several advantages for production server environments:
- Zero Downtime: Security fixes are applied without requiring a system restart
- Continuous Operation: Server services remain available during update installation
- Reduced Maintenance Windows: Eliminates the need for scheduled downtime for security updates
- Improved Security Posture: Faster deployment of critical security fixes
Installation Requirements
Before installing KB5075943, ensure the following requirements are met:
System Prerequisites
- Windows Server 2022 with current servicing stack update
- Administrative privileges for installation
- Minimum 500 MB available disk space
- Active Windows Update service
Network Requirements
- Internet connectivity for Windows Update (if using automatic updates)
- Access to WSUS server (for enterprise deployments)
- Firewall rules allowing Windows Update traffic
Deployment Methods
Organizations can deploy KB5075943 using various methods depending on their infrastructure and requirements:
Automatic Windows Update
The hotpatch is automatically delivered to Windows Server 2022 systems with automatic updates enabled. Installation begins immediately upon download completion.
Manual Installation
Download the standalone package from Microsoft Update Catalog for manual installation using the following command:
wusa.exe KB5075943-x64.msu /quiet /norestartEnterprise Deployment
Use Windows Server Update Services (WSUS) or Microsoft Endpoint Configuration Manager to deploy the hotpatch across multiple servers in a controlled manner.
Verification and Monitoring
After installation, verify the hotpatch was applied successfully:
Get-HotFix -Id KB5075943Check the current OS build number:
[System.Environment]::OSVersion.VersionThe build number should show 20348.4711 after successful installation.
Security Impact Assessment
The vulnerabilities addressed by KB5075943 are classified as critical and important severity levels. Without this update, Windows Server 2022 systems remain vulnerable to:
- Remote code execution attacks targeting server components
- Local privilege escalation attempts
- Information disclosure through network protocols
- Authentication bypass techniques
- Denial of service attacks against server services
Organizations should prioritize the deployment of this hotpatch to maintain security compliance and protect against known vulnerabilities.
Frequently Asked Questions
What does KB5075943 resolve?
Which systems require KB5075943?
Is KB5075943 a security update?
What are the prerequisites for KB5075943?
Are there known issues with KB5075943?
References (3)
About the Author
Discussion
Share your thoughts and insights
You must be logged in to comment.
Related KB Articles

KB5078766 — March 2026 Security Update for Windows Server 2022
KB5078766 is a March 2026 security update that addresses multiple vulnerabilities in Windows Server 2022, including critical remote code execution flaws and privilege escalation issues affecting server infrastructure.

KB5078737 — March 2026 Security Hotpatch for Windows Server 2022
KB5078737 is a March 2026 security hotpatch update for Windows Server 2022 that addresses multiple security vulnerabilities without requiring a system restart, updating the OS build to 20348.4830.

KB5078734 — March 2026 Security Update for Windows Server 2022 23H2
KB5078734 is a March 2026 security update that addresses multiple vulnerabilities in Windows Server 2022 23H2, including critical remote code execution flaws and privilege escalation issues affecting Server Core installations.

KB5078774 — March 2026 Monthly Rollup for Windows Server 2012 R2
KB5078774 is a March 2026 monthly rollup update for Windows Server 2012 R2 that includes security fixes, reliability improvements, and compatibility updates for legacy server environments.