KB5068779 – Windows Server 2022 23H2 – November 2025

KB5068779 is the cumulative update for Windows Server 2022 23H2 edition. It ws released on 11 November 2025 under the ‘Ptch Tuesday’ protcol of Microsoft.

Salient points

  • KB5068779 supersedes KB5066780 released on 14 October 2025.
  • KB5068779 includes all changes that are part of the preview update KB5070879 released on 23 October 2025.
  • KB5068779 corresponds to server build 25398.1965.
  • 31 security vulnerabilities have been disclosed for Windows Server 2022 23H2 edition in November 2025 security report released by Microsoft.
  • 2 CRITICAL security vulnerabilities affect Windows Server 2022 23H2 edition.
  • A zero-day vulnerability also impacts Windows Server 2022 23H2 edition.
  • KB5068778 is the Servicing Stack Update corresponding to KB5068779. It is inbuilt into the main update. Separate installation of the Servicing Stack Update is not needed.

Installing KB5068779

KB5068779 can be installed automatically through the Windows Update program or the WSUS (Windows Server Update Services).

For manual installations, you can download the latest security update from the following page:

Download KB5068779 for Windows Server 2022 23H2 edition

Zero-day vulnerability

One zero-day vulnerability affects Windows Server 2022. The zero-day vulnerabilities are either publicly disclosed or have proven instances of exploitation.

One zero-day vulnerability has been reported for Windows Server 2019 in November 2025.

  • CVE-2025-62215
  • CVSS 3.1 – 7.1
  • This vulnerability is confirmed zero-day vulnerability as it has been exploited and exploitation has been confirmed.
  • The security vulnerability affects Windows Kernel.
  • It could lead to Elevation of Privileges

Critical vulnerabilities

The November security bulletin for Windows Server 2022 reports 31 security vulnerabilities. The 2 CRITICAL vulnerabilities affecting Windows Server 2022 are shared below.

CVE-2025-607249.8Remote Code Execution in GDI+.
CVE-2025-607167Elevation of Privilege vulnerability in DirectX Graphics Kernel.

KB5068779 – Changelog

The following changes are part of the KB5068779 security update for Windows Server 2022 23H2 edition:

  • KB5068779 addresses security of Windows Server 2022 23H2 edition.
  • [Windows Security] Fixed: This update addresses an issue that affected SmartScreen application reputation (Apprep) events from being logged. As a result, you couldn’t always see the level of protection provided by Microsoft Defender SmartScreen.
  • [Networking] Fixed: This update fixes an issue in the HTTP.sys request parser, a Windows component that reads and processes HTTP requests. The parser allowed a single line break within HTTP/1.1 chunk extensions, where the RFC 9112 standard requires a carriage return and line feed (CRLF) sequence to terminate each chunk. This can cause a parsing discrepancy when front end proxies are a part of the setup.

    To turn on strict parsing, use the following registry key:Registry Key: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Http\Parameters]Registry value: “HttpAllowLenientChunkExtParsing”=dword:00000000Data to be set: 0
Rajesh Dhawan

Simplifying technology, one step at a time.