KB5082063 is the cumulative update for Windows Server 2025 version 24H2. It was released on 14 April 2026 under the ‘Patch Tuesday’ program of Microsoft.
Salient points
- KB5082063 supersedes March 2026 cumulative update KB5078740 for Windows Server 2025.
- KB5082063 security update corresponds to the build 26100.32690.
- In April, a total of 121 security vulnerabilities are reported by Microsoft in the latest security report that affect Windows Server 2025.
- No zero-day vulnerabilities affect Windows Server 2025.
- Four CRITICAL security vulnerabilities affect Windows Server2025 in April Patch Tuesday cycle.
- The Servicing Stack Update corresponding to KB5082063 is KB5082062 (26100.32692). It is in-built in the main cumulative update. Separate installation of the SSU or Servicing Stack is not needed.
Zero-day vulnerabilities
No zero-day vulnerability affects Windows Server 2025 24H2 edition. The zero-day vulnerabilities are either publicly disclosed or have proven instances of exploitation.
Critical vulnerabilities
Four Critical vulnerabilities have been disclosed on Windows Server 2025 in the April 2026 security bulletin.
| Vulnerability | CVSS | Impact | Comments |
|---|---|---|---|
| CVE-2026-33824 | 9.8 | Remote Code Execution | Double free in Windows IKE Extension allows an unauthorized attacker to execute code over a network. |
| CVE-2026-33826 | 8 | Remote Code Execution | Improper input validation in Windows Active Directory allows an authorized attacker to execute code over an adjacent network. |
| CVE-2026-33827 | 8.1 | Remote Code Execution | Concurrent execution using shared resource with improper synchronization (‘race condition’) in Windows TCP/IP allows an unauthorized attacker to execute code over a network. |
| CVE-2026-32157 | 8.8 | Remote Code Execution | Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network. |
Download KB5082063
You may download the offline installer file for KB5082063 from the catalog site link shared below:
The update file is available for x64 and ARM64 deployments. Upon installation of KB5078740, the server would restart. So, do plan as a structured change.
Changelog – KB5082063
The following changes or improvements are part of KB5082063 for Windows Server 2025:
- This update addresses security issues detected and shared for Windows Server 2025 24H2 editions.
- [Secure Boot]
- [Kerberos protocol] This update changes the default DefaultDomainSupportedEncTypes value for Kerberos Key Distribution Center (KDC) operations to leverage AES-SHA1 for accounts that don’t have an explicit msds-SupportedEncryptionTypes Active Directory attribute defined. For more information see, How to manage Kerberos KDC usage of RC4 for service account ticket issuance changes related to CVE-2026-20833.
- [Authentication] This update improves how Windows uses Kerberos encryption policies during authentication. After you install this update, Windows reads the configured policy settings as expected, which helps ensure encryption behavior is applied consistently across the domain.
- [Bluetooth] This update improves Bluetooth device management in Settings and Quick Settings, helping connected devices appear consistently and making them easier to add and manage.
- [Graphics] This update improves color rendering when printing from Win32 desktop apps.
- [Networking] This update improves reliability when Windows uses SMB compression over QUIC. After you install this update, SMB compression requests over QUIC complete more consistently, reducing the likelihood of timeouts and supporting smoother, more dependable performance.
- [PowerShell] This update improves how the Set-GPPrefRegistryValue cmdlet in PowerShell imports registry preference values. The cmdlet now preserves each imported value in full, including the final character.
- [Remote Desktop] This update improves protection against phishing attacks that use Remote Desktop (.rdp) files. When you open an .rdp file, Remote Desktop shows all requested connection settings before it connects, with each setting turned off by default. A one-time security warning also appears the first time you open an .rdp file on a device. For more information, see Understanding security warnings when opening Remote Desktop (RDP) files.
- [Texts and Fonts] This update improves Windows fonts by adding the new Saudi Riyal currency symbol. This change helps keep text clear, accurate, and visually consistent across your Windows apps and experiences.
- [Windows Deployment Services (WDS)] This update disables the “Hands-Free Deployment” feature in WDS by default and is no longer a supported feature. For more information about this change, see Windows Deployment Services (WDS) Hands-Free Deployment Hardening Guidance related to CVE-2026-0386.
Important Reminder for Secure Boot Services
It is important to note that the Secure Boot certificates used by most Windows devices are set to expire starting in June 2026. Secure Boot is a security feature in Unified Extensible Firmware Interface (UEFI) based firmware that helps ensure that only trusted software runs during a device’s boot (start) sequence.
Since Windows introduced Secure Boot support, all Windows-based devices have carried the same set of Microsoft certificates in the KEK and DB. These original certificates are nearing their expiration date, and your device is affected if it has any of the listed certificate versions. To continue running Windows and receiving regular updates for your Secure Boot configuration, you will need to update these certificates.
Simplifying technology, one step at a time.