KB5014011: Windows Server 2012 R2 Security Update (May 2022)
A crafted NFS request can give an attacker SYSTEM-level code execution on any Windows Server running the NFS Server role.
An attacker on the network who can reach the NFS server (TCP/UDP 2049 plus portmapper and lockd helpers) can send a crafted request and execute code as SYSTEM. From SYSTEM the attacker controls every file share the server hosts — read, write, delete, ransomware-encrypt — and can pivot to clients that mount the shares.
The Windows Network File System (NFS) Server role lets Windows servers share files with Linux, Unix, and ESXi clients. A stack buffer overflow in NLM Portmap handling — GETADDR RPC response is crafted by the attacker in the NFS handler lets crafted requests corrupt server memory and execute code. The NFS Server role is not installed by default but is widely enabled in mixed-OS environments.
Probably yes if any of these apply:
Affected OS versions
An attacker triggers an NLM (Network Lock Manager) request that causes the NFS server to issue an outbound GETADDR RPC; the attacker controls the response and crafts a GETADDR reply that overflows the server's stack buffer. The result is SYSTEM-level code execution on a server that holds shared files for an entire department.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5014011Manual remediation steps
Decide if you need the NFS Server role
The Windows NFS Server role is not installed by default. If you do not have Linux/Unix/ESXi clients using NFS, remove the role:
Get-WindowsFeature -Name FS-NFS-Service | Where-Object Installed
# Uninstall-WindowsFeature -Name FS-NFS-Service
Prerequisites
Estimated time
20–40 minutes per server (download + install + reboot)
Reboot required
Yes — install the cumulative update and reboot the server before the fix is active.
Steps
1. Confirm the server is missing the patch
Get-HotFix -Id KB5014011 -ErrorAction SilentlyContinue
2. Install the update — pick one channel
Windows Update / WSUS (preferred):
UsoClient ScanInstallWait
Manual download (offline / air-gapped):
3. Reboot
Restart-Computer -Force
Verification
Get-HotFix -Id KB5014011
[System.Environment]::OSVersion.Version
Rollback
wusa.exe /uninstall /kb:5014011 /quiet /norestart
Notes
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.