IRONSMITHINTEL
CRITICALCVSS9.1
|CVE-2025-50171|Auth: none|Reboot: required|Manual only

KB5063880: Windows Server 2022 Security Update (August 2025)

An attacker on your network can impersonate a Remote Desktop server, trick users into connecting, and steal their credentials.

Published Aug 12, 2025 · Updated May 21, 2026
Why patchRisk explained in plain English
Worst-case scenarioIf unpatched

An attacker on the same network as a victim — through ARP spoofing, DHCP option injection, or a compromised network device — can intercept an RDP connection request and respond as the spoofed server. The user, seeing what looks like the normal logon prompt, enters their credentials, which the attacker captures. The attacker can then forward the session to the real server or simply walk away with usable administrator credentials.

How the attack works

The Remote Desktop Server is the Windows component that accepts incoming RDP connections — the same service administrators use every day to reach servers. When a client opens an RDP session, the server is supposed to prove its identity before the client sends any credentials. A missing authorisation check lets an attacker who can intercept or redirect RDP traffic present themselves as the legitimate server, with no certificate forgery or man-in-the-middle CA needed.

Am I affected?Quick check

Probably yes if any of these apply:

Any server with the Remote Desktop role enabled — RDS hosts, jump boxes, management servers
Environments where administrators RDP across untrusted network segments

Affected OS versions

Windows Server 2022
Real-world incidentsWhat we've seen

A red-team operator gains code execution on one workstation inside a corporate LAN. From there they ARP-spoof a single subnet so that traffic to the jump box flows through them. The next administrator who connects via RDP sees what appears to be a normal session; their password lands in the attacker's log. Hours later the attacker uses that password to walk into the production environment as a domain admin.

How to patch

Manual download

For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.

↗ Microsoft Update CatalogKB5063880

Manual remediation steps

Prerequisites

    1
    Local administrator on the target server
    1
    Maintenance window with reboot capacity
    1
    Current backup or snapshot you can roll back to
    1
    Network path to Windows Update / WSUS / Microsoft Update Catalog

Estimated time

20–40 minutes per server (download + install + reboot)

Reboot required

Yes — install the cumulative update and reboot the server before the fix is active.

Steps

1. Confirm the server is missing the patch

# If this returns the KB, you are already patched. If it returns nothing, continue.
Get-HotFix -Id KB5063880 -ErrorAction SilentlyContinue

2. Install the update — pick one channel

Windows Update / WSUS (preferred):

# Trigger an immediate scan and install
UsoClient ScanInstallWait
# (or use your standard WSUS / SCCM / Intune deployment for KB5063880)

Manual download (offline or air-gapped servers):

1
Open Microsoft Update Catalog: https://catalog.update.microsoft.com/Search.aspx?q=KB5063880
2
Download the MSU for Windows Server 2022 that matches your architecture (x64).
3
Copy the .msu file to the server and run as Administrator.

3. Reboot

Restart-Computer -Force

Verification

After the reboot:

# The KB must appear with an InstalledOn date
Get-HotFix -Id KB5063880

# Confirm OS build advanced
[System.Environment]::OSVersion.Version

If Get-HotFix returns nothing for KB5063880, the install did not take — re-run the update from a different channel.

Rollback

# Remove the update (last resort — only if the update breaks a workload)
wusa.exe /uninstall /kb:5063880 /quiet /norestart
# Reboot after uninstall

Cumulative updates can be removed but the server then loses every fix that update delivered, including this one. Prefer rolling forward to a newer cumulative.

Notes

    1
    This entry covers Windows Server 2022 specifically (KB5063880). Other Windows Server versions have their own KB for CVE-2025-50171.
    1
    Reference advisories: MSRC https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50171 and NVD https://nvd.nist.gov/vuln/detail/CVE-2025-50171.
PowerShell automationComing soon

No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.