KB5058392: Windows Server 2019 Cumulative Update (May 2025)
The May 2025 cumulative update for Windows Server 2019 bundles the same critical fixes as the Server 2022 rollup: five exploited-in-the-wild zero-days (CLFS, WinSock, DWM, Scripting Engine) plus two CVSS 8.8 Remote Desktop heap-overflow RCEs. Apply on the same SLA as KB5058385.
Identical impact profile to Server 2022: any local code execution can be escalated to SYSTEM via the EoP chain, and the Scripting Engine / Remote Desktop RCEs add network-reachable code-execution surfaces where the prerequisite user interaction or outbound RDP path exists.
KB5058392 is the LTSC servicing-channel rollup of every Windows Server 2019 security fix for May 2025 Patch Tuesday. Same CVE coverage as KB5058385 on Server 2022: four exploited EoP zero-days (CLFS x2, WinSock AFD, DWM Core), one exploited Scripting Engine memory-corruption RCE, and two critical-severity Remote Desktop heap-buffer-overflow RCEs.
Probably yes if any of these apply:
Affected OS versions
Per Microsoft and corroborated by CrowdStrike and Tenable, all four EoP zero-days and the Scripting Engine RCE were observed in the wild before the May 13 2025 release. The CLFS driver continues to be a recurring target — three in-the-wild CLFS EoP fixes shipped in the first five months of 2025.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5058392Manual remediation steps
⏱ 30–60 minutes including rebootCheck if KB5058392 is Installed
Get-HotFix -Id KB5058392
# No output = patch not installed
Apply via Windows Update
Apply Manually
wusa.exe windows10.0-kb5058392-x64.msu /quiet /norestart
Apply via WSUS / SCCM
Approve KB5058392. It is classified as a Security Update for Windows Server 2019.
Verify
Get-HotFix -Id KB5058392
Get-ComputerInfo | Select-Object WindowsVersion, OsBuildNumber
# Build must be 17763.7314 or higher
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.
| Patch ID | CVE ID | Vulnerability Name / Type | CVSS | Reference |
|---|---|---|---|---|
| KB5058392 | CVE-2025-32701 | Elevation of Privilege — Windows Common Log File System Driver | 7.8 | NVD ↗ |
| KB5058392 | CVE-2025-32706 | Elevation of Privilege — Windows Common Log File System Driver | 7.8 | NVD ↗ |
| KB5058392 | CVE-2025-32709 | Elevation of Privilege — Windows Ancillary Function Driver for WinSock | 7.8 | NVD ↗ |
| KB5058392 | CVE-2025-30400 | Elevation of Privilege — Microsoft DWM Core Library | 7.8 | NVD ↗ |
| KB5058392 | CVE-2025-30397 | Remote Code Execution — Microsoft Scripting Engine (memory corruption) | 7.5 | NVD ↗ |
| KB5058392 | CVE-2025-29966 | Remote Code Execution — Windows Remote Desktop (heap buffer overflow) | 8.8 | NVD ↗ |
| KB5058392 | CVE-2025-29967 | Remote Code Execution — Remote Desktop Gateway Service (heap overflow) | 8.8 | NVD ↗ |