KB5063880 is the cumulative update for Windows Server 2022 and Windows Server 2022 Server Core installation. It was released on 12 August, 2025 under the ‘Patch Tuesday’ release cycle.
KB5063880 is for Windows Server 2022 21H2 and 22H2 editions. For Windows Server 2022 23H2 edition, the applicable cumulative update is KB5063899.
Salient points
- KB5063880 supersedes July 2025 cumulative update KB5062572.
- KB5063880 corresponds to server build 20348.4052.
- No Zero-day vulnerabilities affect Windows Server 2022 and Windows Server 2022 Server Core installation.
- 55 security vulnerabilities have been reported in the August security bulletin for Windows Server 2022.
- 4 CRITICAL security vulnerabilities affect Windows Server 2022. Details of these are shared below.
- The Servicing Stack Update corresponding to KB5063880 is KB5062793 with build number corresponding to 20348.3920. Separate installation of the SSU or Servicing Stack is not needed. This SSU was released in July 2025. If you installed KB5062572 in July, the SSU would have been already deployed.
Zero-day vulnerability
There are no zero-day vulnerabilities affecting Windows Server 2022. The zero-day vulnerabilities are either publicly disclosed or have proven instances of exploitation.
Critical vulnerabilities
The August security bulletin for Windows Server 2022 reports 55 security vulnerabilities. The 4 CRITICAL vulnerabilities affecting Windows Server 2022 are shared below.
| Vulnerability | CVSS | Impact | Description |
|---|---|---|---|
| CVE-2025-53766 | 9.8 | Remote Code Execution | Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network. |
| CVE-2025-53778 | 8.8 | Elevation of Privilege | Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network. |
| CVE-2025-50177 | 8.1 | Remote Code Execution | Use after free in Windows Message Queuing allows an unauthorized attacker to execute code over a network. |
| CVE-2025-48807 | 7.5 | Remote Code Execution | Improper restriction of communication channel to intended endpoints in Windows Hyper-V allows an authorized attacker to execute code locally. |
Download KB5063880
You may download the offline installer file for KB5063880 from the catalog site link shared below:
The cumulative update is available for x64 deployments for Windows Server 2022 versions 21H2 and 22H2. Upon installation of KB5063880, the server would restart.
Changelog – KB5063880
The following changes or improvements are part of KB5063880 for Windows Server 2022 21H2 and 22H2 editions:
- This security update addresses security vulnerabilties on Windows Server 2022.
- [Input (know issue)] Fixed: An issue when using the Microsoft Changjie IME (input method editor) for Traditional Chinese might cause problems such as not being able to form or select words, unresponsive spacebar or blank key, incorrect word output, or a broken candidate window display. This can occur after installing KB5062572.
Secure Boot Services
It is important to note that the Secure Boot certificates used by most Windows devices are set to expire starting in June 2026. Secure Boot is a security feature in Unified Extensible Firmware Interface (UEFI) based firmware that helps ensure that only trusted software runs during a device’s boot (start) sequence.
Since Windows introduced Secure Boot support, all Windows-based devices have carried the same set of Microsoft certificates in the KEK and DB. These original certificates are nearing their expiration date, and your device is affected if it has any of the listed certificate versions. To continue running Windows and receiving regular updates for your Secure Boot configuration, you will need to update these certificates.
Simplifying technology, one step at a time.