KB5082142: Windows Server 2022 Security Update (April 2026)
An attacker can bypass a Windows network security feature through a flaw in how the Windows Shell validates and enforces security policy.
An attacker chains this bypass with another vector — a phishing attachment, a malicious download, or an existing foothold — to evade the protection the bypassed feature provides. In practice that means getting attacker-controlled content past a check that would normally warn the user or block execution (e.g., suppressing a Mark-of-the-Web warning so a downloaded file runs without the usual prompt).
The Windows Shell is the component that handles file associations, shortcuts, URI handlers, and the enforcement of several security policies (Mark-of-the-Web, application control, UAC prompts). A flaw lets an attacker bypass a network security feature the Shell is supposed to enforce — typically by exploiting inconsistencies between how a security policy is defined and how the Shell interprets it.
Probably yes if any of these apply:
Affected OS versions
An attacker sends a phishing email with an attachment that would normally trigger a Mark-of-the-Web "this file came from the internet" warning. Exploiting the Shell bypass, the file opens without the warning, and the user runs it believing it is safe. Shell and Mark-of-the-Web bypasses appear in CISA KEV listings regularly because they are the first step that turns a phishing email into code execution.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5082142Manual remediation steps
Prerequisites
Estimated time
20–40 minutes per server (download + install + reboot)
Reboot required
Yes — install the cumulative update and reboot the server before the fix is active.
Steps
1. Confirm the server is missing the patch
Get-HotFix -Id KB5082142 -ErrorAction SilentlyContinue
2. Install the update — pick one channel
Windows Update / WSUS (preferred):
UsoClient ScanInstallWait
Manual download (offline / air-gapped):
3. Reboot
Restart-Computer -Force
Verification
Get-HotFix -Id KB5082142
[System.Environment]::OSVersion.Version
Rollback
wusa.exe /uninstall /kb:5082142 /quiet /norestart
Notes
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.