KB5058379: Windows Server 2025, Windows Server 2022 +4 more Security Update (May 2025)
A local EoP vulnerability in the Desktop Window Manager (DWM) Core Library, exploited in the wild prior to the May 13 2025 disclosure. A local attacker can escalate to SYSTEM via the dwmcore.dll component. Fixed by the May 2025 cumulative update.
A low-privilege local user can escalate to SYSTEM-equivalent privileges by exploiting the DWM Core Library. As with the CLFS EoPs, the typical attack path is post-initial-access: the attacker already has unprivileged code execution and uses this flaw as the privilege-escalation step.
CVE-2025-30400 is an elevation-of-privilege flaw in the DWM Core Library, the compositor component responsible for rendering and managing the Windows desktop. Flaws in DWM IPC handling allow a local attacker to influence privileged DWM behaviour from a low-privilege context, leading to code execution at the DWM session's elevated integrity level.
Probably yes if any of these apply:
Affected OS versions
Microsoft confirmed in-the-wild exploitation of CVE-2025-30400 at the May 13 2025 release. DWM has historically attracted attacker attention because the desktop compositor runs at a higher integrity level than the user session, making it a reliable EoP target.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5058379Manual remediation steps
⏱ 30–60 minutes including rebootApply the Microsoft Security Update
Microsoft has released an official security update that fixes this vulnerability.
Required KB Updates
Supersedes: KB5055518, KB5055519, KB5055523, KB5055526, KB5055527, KB5055528
Affected Products
Fixed Build Numbers
Installation Methods
Windows Update (recommended)
Microsoft Update Catalog (manual download)
.msu installer with administrator privilegesWSUS / SCCM / Intune
Approve KB5058379 for the affected products in your update management console.
Microsoft Download Center Links
Verification
Confirm the update is installed:
Get-HotFix | Where-Object { $_.HotFixID -in @('KB5058379','KB5058384','KB5058385','KB5058392','KB5058405','KB5058411','KB5058497','KB5058500') }
References
Discovery Credit
Microsoft Threat Intelligence Center
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.