IRONSMITHINTEL
CRITICALCVSS9.3
|CVE-2026-40402|Auth: none|Reboot: required|Manual only

KB5087545: Windows Server 2022 Security Update (May 2026)

An attacker with code running inside a Hyper-V guest VM can break out and execute code on the host operating system.

Published May 12, 2026 · Updated May 21, 2026
Why patchRisk explained in plain English
Worst-case scenarioIf unpatched

An attacker who has any code execution inside a guest VM — a tenant on a multi-tenant host, a compromised developer VM, a sandboxed workload — can send crafted requests to the virtual device layer, exploit the use-after-free, and execute code on the host operating system. Once on the host, the attacker controls every other guest on the same hypervisor and any resources the host can reach.

How the attack works

Hyper-V is the Windows hypervisor — the layer that runs and isolates guest virtual machines on a host. The fundamental security guarantee of Hyper-V is that code inside a guest cannot reach the host. A use-after-free flaw in how Hyper-V emulates virtual devices for a guest breaks that guarantee: the hypervisor frees a memory object while still holding a dangling pointer to it, and a guest can manipulate the timing to redirect that pointer to attacker-controlled data.

Am I affected?Quick check

Probably yes if any of these apply:

Any server running the Hyper-V role with untrusted guests (multi-tenant hosting, developer sandboxes, malware analysis labs)
Hyper-V hosts running guest VMs that could be compromised through other means

Affected OS versions

Windows Server 2022
Real-world incidentsWhat we've seen

A managed-service provider runs customer workloads on shared Hyper-V hosts — different customers, different VMs, same physical box. One customer is compromised through a phishing campaign; the attacker installs the exploit inside the customer's VM, escapes to the host, and now has SYSTEM on a hypervisor that runs dozens of other customers' VMs. This is the highest-severity scenario for any virtualised environment and is precisely why hypervisor escapes are treated as critical regardless of the local attack vector.

How to patch

Manual download

For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.

↗ Microsoft Update CatalogKB5087545

Manual remediation steps

Prerequisites

    1
    Local administrator on the target server
    1
    Maintenance window with reboot capacity
    1
    Current backup or snapshot you can roll back to
    1
    Network path to Windows Update / WSUS / Microsoft Update Catalog

Estimated time

20–40 minutes per server (download + install + reboot)

Reboot required

Yes — install the cumulative update and reboot the server before the fix is active.

Steps

1. Confirm the server is missing the patch

# If this returns the KB, you are already patched. If it returns nothing, continue.
Get-HotFix -Id KB5087545 -ErrorAction SilentlyContinue

2. Install the update — pick one channel

Windows Update / WSUS (preferred):

# Trigger an immediate scan and install
UsoClient ScanInstallWait
# (or use your standard WSUS / SCCM / Intune deployment for KB5087545)

Manual download (offline or air-gapped servers):

1
Open Microsoft Update Catalog: https://catalog.update.microsoft.com/Search.aspx?q=KB5087545
2
Download the MSU for Windows Server 2022 that matches your architecture (x64).
3
Copy the .msu file to the server and run as Administrator.

3. Reboot

Restart-Computer -Force

Verification

After the reboot:

# The KB must appear with an InstalledOn date
Get-HotFix -Id KB5087545

# Confirm OS build advanced
[System.Environment]::OSVersion.Version

If Get-HotFix returns nothing for KB5087545, the install did not take — re-run the update from a different channel.

Rollback

# Remove the update (last resort — only if the update breaks a workload)
wusa.exe /uninstall /kb:5087545 /quiet /norestart
# Reboot after uninstall

Cumulative updates can be removed but the server then loses every fix that update delivered, including this one. Prefer rolling forward to a newer cumulative.

Notes

    1
    This entry covers Windows Server 2022 specifically (KB5087545). Other Windows Server versions have their own KB for CVE-2026-40402.
    1
    Reference advisories: MSRC https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40402 and NVD https://nvd.nist.gov/vuln/detail/CVE-2026-40402.
PowerShell automationComing soon

No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.