IRONSMITHINTEL
CRITICALCVSS7.8
|
Actively Exploited
|CISA KEV|Auth: low — local user required|Reboot: required|Est. 30–60 minutes including reboot|Manual only

KB5025229: Windows Server 2022 Cumulative Update (April 2023)

The April 2023 Patch Tuesday cumulative update for Windows Server 2022 addresses 97 security vulnerabilities including a zero-day in the Windows Common Log File System driver (CVE-2023-28252) that was being actively exploited by ransomware groups at time of release.

Published Apr 11, 2023 · Updated May 10, 2026
Why patchRisk explained in plain English
Worst-case scenarioIf unpatched

CVE-2023-28252 allows any user with local code execution to escalate to SYSTEM on unpatched systems. Ransomware operators used this as part of their post-exploitation chain after gaining initial access via phishing or exposed services — it provides the privilege level needed to disable AV, encrypt files, and spread laterally.

How the attack worksNo clicks needed

KB5025229 patches 97 CVEs in April 2023, including CVE-2023-28252, a privilege escalation in the Windows Common Log File System (CLFS) driver that was actively exploited by the Nokoyawa ransomware group. The CLFS driver is present on all Windows systems and can be exploited by any local user to gain SYSTEM privileges.

Am I affected?Quick check

Probably yes if any of these apply:

All Windows Server 2022 systems
Running Windows Server 2022 prior to KB5025229

Affected OS versions

Windows Server 2022
Fixed inKB5025229
Real-world incidentsWhat we've seen

The Nokoyawa ransomware group exploited CVE-2023-28252 as a zero-day prior to the April 2023 patch. Kaspersky observed multiple incidents where the CLFS driver exploit was used to escalate from a standard user session to SYSTEM, bypassing endpoint security tools that blocked elevated process creation. Microsoft and CISA confirmed active exploitation on Patch Tuesday itself.

How to patch

Manual download

For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.

↗ Microsoft Update CatalogKB5025229

Manual remediation steps

30–60 minutes including reboot

Check if KB5025229 is Installed

Get-HotFix -Id KB5025229

Apply

1
Download from https://catalog.update.microsoft.com/search.aspx?q=KB5025229
2
Install as Administrator
3
Restart

Verify

Get-HotFix -Id KB5025229
PowerShell automationComing soon

No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.