KB5032196: Windows Server 2019 Security Update (November 2023)
A crafted authentication packet to a Windows Network Policy Server can give an attacker SYSTEM-level code execution.
An attacker who can reach the RADIUS endpoint of an NPS with a PEAP network policy enabled can send a crafted PEAP packet during the pre-authentication phase, trigger the heap overflow, and run code as SYSTEM. From SYSTEM the attacker controls the authentication source for every wireless and wired client the NPS serves.
PEAP is the authentication protocol used by WPA2-Enterprise Wi-Fi, 802.1X wired authentication, and many enterprise VPNs. The Windows Network Policy Server (NPS) role terminates PEAP for these workflows. A heap-based buffer overflow in how NPS parses PEAP authentication messages lets an unauthenticated attacker send a crafted PEAP packet and execute code in the NPS service context.
Probably yes if any of these apply:
Affected OS versions
An attacker on the corporate guest Wi-Fi reaches the internal RADIUS server through a misconfigured firewall exception. The attacker sends a crafted PEAP packet, the NPS service runs the attacker's code, and they now own the authentication infrastructure for the entire building — including the credentials of every 802.1X-authenticated workstation that connects. PEAP CVEs are uniquely dangerous because they target the trust anchor of network access.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5032196Manual remediation steps
Prerequisites
Estimated time
20–40 minutes per server (download + install + reboot)
Reboot required
Yes — install the cumulative update and reboot the server before the fix is active.
Steps
1. Confirm the server is missing the patch
Get-HotFix -Id KB5032196 -ErrorAction SilentlyContinue
2. Install the update — pick one channel
Windows Update / WSUS (preferred):
UsoClient ScanInstallWait
# (or use your standard WSUS / SCCM / Intune deployment for KB5032196)
Manual download (offline / air-gapped):
3. Reboot
Restart-Computer -Force
Verification
Get-HotFix -Id KB5032196
[System.Environment]::OSVersion.Version
Rollback
wusa.exe /uninstall /kb:5032196 /quiet /norestart
# Reboot after uninstall
Removing a cumulative update also removes every fix it delivered — prefer rolling forward.
Notes
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.