KB5082198: Windows Server 2016 Security Update (April 2026)
A crafted IPv6 packet can give an attacker remote code execution on a Windows Server with IPsec enabled — wormable, requires no credentials.
An attacker who can deliver IPv6 packets to a Windows host with IPsec enabled can send a crafted sequence that triggers the race condition and executes code in kernel context — no credentials, no user interaction. The "wormable" classification means a successful exploit can spread host-to-host automatically. The high attack complexity (the attacker must win a timing race and pre-stage the environment) tempers the practical risk but does not eliminate it.
The Windows TCP/IP stack processes every IP packet in kernel mode. A race condition (CWE-362) in how it handles crafted IPv6 packets on hosts where IPsec is enabled lets an attacker who wins the race corrupt kernel memory and execute code. IPv6 is enabled by default on every modern Windows host; IPsec is enabled on hosts that participate in any IPsec policy (common on domain-joined servers and VPN endpoints).
Probably yes if any of these apply:
Affected OS versions
A corporate environment uses IPsec between data centres, and every endpoint has IPv6 on by default. An attacker who can deliver IPv6 packets to a perimeter host repeatedly attempts the race; on success they gain kernel-level code execution and seed a worm that targets the next IPsec-enabled host. This is the same family as CVE-2024-38063 (the 2024 IPv6 RCE) — network-stack bugs that nobody can sensibly block at the perimeter.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5082198Manual remediation steps
Check whether IPsec is in use
The race is only reachable when IPsec is active:
Get-Service PolicyAgent | Select-Object Name, Status, StartType
Get-NetIPsecRule -PolicyStore ActiveStore -ErrorAction SilentlyContinue | Select-Object -First 5
Hosts without IPsec active are not exploitable via this path — but patch regardless.
Prerequisites
Estimated time
20–40 minutes per server (download + install + reboot)
Reboot required
Yes — install the cumulative update and reboot the server before the fix is active.
Steps
1. Confirm the server is missing the patch
Get-HotFix -Id KB5082198 -ErrorAction SilentlyContinue
2. Install the update — pick one channel
Windows Update / WSUS (preferred):
UsoClient ScanInstallWait
Manual download (offline / air-gapped):
3. Reboot
Restart-Computer -Force
Verification
Get-HotFix -Id KB5082198
[System.Environment]::OSVersion.Version
Rollback
wusa.exe /uninstall /kb:5082198 /quiet /norestart
Notes
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.