Microsoft has released KB5068781 — the first cumulative security rollup for Windows 10 distributed through the Extended Security Updates (ESU) program — advancing 22H2 systems to Build 19045.6575 and delivering a targeted set of security and servicing fixes for ESU‑enrolled devices. This update is being pushed via Windows Update to eligible machines and is also available as a standalone offline installer from the Microsoft Update Catalog for administrators and offline environments.
Microsoft ended mainstream support for Windows 10 in mid‑November 2025 and opened a time‑boxed ESU path so devices that cannot move to Windows 11 can still receive security‑only updates for a limited period. KB5068781 is the November 11, 2025 cumulative for ESU‑eligible Windows 10 systems and is paired with a servicing stack update to improve install reliability for subsequent patches. The Microsoft KB page for the release lists the builds, the packaging notes (combined SSU + LCU), and guidance for offline servicing. This initial ESU cumulative addresses several functional issues (notably a Settings/UI message glitch that erroneously showed “Your version of Windows has reached the end of support”), and includes the monthly security mitigations that Microsoft deemed necessary for ESU systems. Independent tracking and community coverage also identify a high‑priority kernel elevation‑of‑privilege vulnerability (CVE‑2025‑62215) addressed in this cycle — described by vendors and databases as a race‑condition/double‑free in the Windows kernel and reported as actively exploited in the wild prior to the patch.
If there is any doubt about which package to choose, the authoritative source remains Microsoft’s KB article and the Microsoft Update Catalog entry for KB5068781; for security‑critical environments, cross‑check CVE entries in the Microsoft Security Update Guide and NVD before final rollout.
Conclusion: KB5068781 is the first ESU cumulative for Windows 10 that restores servicing and enrollment plumbing while shipping security fixes (including a patched kernel zero‑day). Apply it promptly where required, follow Microsoft’s SSU and catalog guidance for offline installs, and use this one‑year ESU window to plan a secure migration rather than relying on ESU indefinitely.
Source: Windows Latest Windows 10 KB5068781 ESU update released, direct download links for offline installer (.msu)
Background / Overview
Microsoft ended mainstream support for Windows 10 in mid‑November 2025 and opened a time‑boxed ESU path so devices that cannot move to Windows 11 can still receive security‑only updates for a limited period. KB5068781 is the November 11, 2025 cumulative for ESU‑eligible Windows 10 systems and is paired with a servicing stack update to improve install reliability for subsequent patches. The Microsoft KB page for the release lists the builds, the packaging notes (combined SSU + LCU), and guidance for offline servicing. This initial ESU cumulative addresses several functional issues (notably a Settings/UI message glitch that erroneously showed “Your version of Windows has reached the end of support”), and includes the monthly security mitigations that Microsoft deemed necessary for ESU systems. Independent tracking and community coverage also identify a high‑priority kernel elevation‑of‑privilege vulnerability (CVE‑2025‑62215) addressed in this cycle — described by vendors and databases as a race‑condition/double‑free in the Windows kernel and reported as actively exploited in the wild prior to the patch. What KB5068781 delivers
Summary of changes (what to expect)
- OS build bump: Windows 10 22H2 -> Build 19045.6575 (21H2 equivalent also advanced).
- Security fixes: A package of vulnerability mitigations and kernel hardening, including remediation for a locally exploitable kernel privilege‑escalation vulnerability tracked as CVE‑2025‑62215. Multiple third‑party trackers and the NVD list the CVE and note active exploitation prior to the rollup.
- Servicing stack (SSU) combined: The release is distributed as a combined SSU + LCU in catalog packages, and Microsoft recommends the latest SSU be present before applying additional updates. Offline installers will often contain the SSU inside the combined MSU.
- Bug fix for ESU enrollment UX: The update corrects a regression that could prevent the in‑OS ESU enrollment wizard from appearing or completing — an important operational fix because the wizard gates delivery of future ESU updates for consumer devices.
Security posture: the zero‑day and other CVEs
Multiple security trackers and vendor writeups confirm that the November ESU rollup addresses dozens of vulnerabilities across Windows components, and specifically remediates CVE‑2025‑62215 — a kernel elevation‑of‑privilege issue that NVD classifies as a race condition/double‑free and that several intelligence sources report as actively exploited. Because this CVE allows an attacker with a low‑privileged foothold to escalate to SYSTEM, it is high‑priority for patching on any ESU‑eligible host that cannot be upgraded. Note: public tallies of “how many CVEs” are aggregated differently by outlets (what counts as “Windows” vs. Microsoft product surface, and whether Edge or Azure items are included). Independent reports vary in their totals; treat headline counts as approximate unless confirmed by Microsoft’s Security Update Guide.Who is eligible and how updates are delivered
ESU eligibility and enrollment
Consumer ESU enrollment was designed to be accessible through the Settings → Windows Update “Enroll now” wizard for eligible Windows 10 22H2 devices. Microsoft published three consumer enrollment paths:- Sync Settings to a Microsoft Account (the free path that binds ESU entitlement to the Microsoft Account and settings backup),
- Redeem Microsoft Rewards points, or
- Purchase a consumer ESU license (a one‑time fee charged through the Microsoft Store).
Delivery channels
- Windows Update: automatic (for ESU‑eligible, enrolled devices).
- Microsoft Update Catalog / WSUS / Intune / Configuration Manager: offline and managed distribution (catalog .msu packages). Microsoft documents SSU prerequisites and recommends installing the SSU before other offline LCUs if required.
Offline installer (.msu) and sizes — practical notes
If you manage offline systems, imaging workflows, or need a deterministic install path, the Microsoft Update Catalog publishes the KB5068781 package as a downloadable .msu file. Administrative installations for disconnected devices commonly use:- Double‑clicking the .msu to invoke the Windows Update Standalone Installer (WUSA),
- wusa.exe for scripted installs (wusa.exe <filename>.msu /quiet /norestart), or
- DISM for offline image servicing (DISM /Online /Add‑Package /PackagePath:<path\to\file.msu>).
- Windows Update uses express/delta delivery and will typically download a much smaller payload (tens to a few hundred MB depending on prior state). Outlets and field testing reported the over‑the‑air delta around ~200MB for many devices. The full catalog .msu file will be larger because it often contains the combined SSU+LCU bundle and language components; some outlets reported catalog packages in the hundreds of MBs (Windows Latest reported ~720MB for KB5068781), and other feature‑stream families may show larger sizes depending on the build family and included components. Expect catalog packages to be significantly larger than the express delta delivered by Windows Update. Treat any published size as approximate and verify the actual file size in the Update Catalog before distribution.
Step‑by‑step: how to download and install the offline .msu safely
- Confirm OS and architecture: run winver or open Settings → System → About and verify you are on Windows 10 version 22H2 (or 21H2 if managed under enterprise terms).
- Visit the Microsoft Update Catalog and search for KB5068781; pick the package that matches your SKU and architecture and download the .msu. The catalog lists any additional SSU or dependent packages you may need for offline images.
- Verify the file hash (optional but strongly recommended): PowerShell Get‑FileHash -Algorithm SHA256 <path\to\file.msu> and compare with any published checksum your organization maintains.
- For interactive installs: run the .msu as administrator (double‑click) and follow the prompts. For quiet installs: run wusa.exe <file>.msu /quiet /norestart. For image servicing: DISM /Online /Add‑Package /PackagePath:<file>.msu.
- Reboot if prompted. Verify new build by running winver or checking Settings → About.
- If you deploy via WSUS/Configuration Manager/Intune, stage the SSU first where catalog guidance requires it. The combined SSU+LCU package can be irreversible at the SSU level; plan rollback strategies (system images, recovery points) accordingly.
Enterprise and IT operational guidance
- Pilot ring first: Validate KB5068781 on a small, representative set of devices (drivers, legacy apps, imaging) before broad rollout. Community reports show occasional installation anomalies on minority configurations after major servicing changes.
- SSU prerequisites: Confirm devices have the required servicing stack updates. Offline images that miss SSU prerequisites can report “not applicable” or fail to install the catalog package. Microsoft’s KB lists specific SSU prerequisites for offline scenarios.
- WSUS/Intune strategy: Synchronize the Microsoft Update Catalog in WSUS, and test phased deployments via Update Rings or deployment rings in ConfigMgr/Intune. Monitor telemetry and UAT for false positives (for example, the “end of support” banner issue) and be prepared to roll back LCU components using DISM if necessary.
- Backups and recovery: Always capture BitLocker recovery keys and create system images prior to applying combined SSU+LCU packages in wide production rollouts. Some SSU changes may change boot behavior in edge cases.
Risk assessment — strengths and limitations
Strengths
- Targeted security coverage: ESU + KB5068781 provide a short, controlled safety net for devices that cannot upgrade immediately, while Microsoft focuses full engineering resources on newer releases. This is essential where hardware, regulatory, or application compatibility constraints delay migration.
- Active exploitation addressed: The inclusion of a fix for CVE‑2025‑62215 eliminates a high‑impact local privilege escalation vector that threat actors were reported to be using; for at‑risk environments this patch significantly reduces a known, immediate risk.
- Multiple delivery channels: Windows Update, Microsoft Update Catalog, and enterprise tooling (WSUS/Intune/ConfigMgr) provide flexible deployment options for different operational needs.
Limitations and risks
- Time‑boxed coverage: Consumer ESU is a bridge (not a permanent solution). Organizations should treat ESU as a migration runway not a long‑term strategy — ESU windows are limited and the longer you delay migration, the greater the cumulative compatibility and security debt.
- Account‑centric enrollment: Consumer ESU enrollment binds entitlement to a Microsoft Account (although regional concessions exist). This design simplifies licensing for Microsoft but creates operational and privacy tradeoffs for some users and organizations.
- Complex offline servicing: Combined SSU+LCU packages are convenient but also create irreversible servicing stack changes; offline image servicing requires careful sequencing and testing to avoid failed installs.
- Third‑party ecosystem drift: Even with ESU patches, third‑party vendors will increasingly adopt Windows 11 as the supported baseline; third‑party application and driver compatibility may degrade over time on Windows 10, creating hidden migration costs.
Verification and cross‑checks (what was confirmed)
- The official Microsoft support article for the November 11, 2025 release documents KB5068781, the build numbers 19044.6575 / 19045.6575, guidance for SSU prerequisites, and the availability via Windows Update and the Update Catalog. This is the canonical release note for the cumulative.
- Independent security databases (NVD) and vendor advisories list CVE‑2025‑62215 as a race‑condition/double‑free kernel elevation‑of‑privilege and show it was assigned and published on November 11, 2025; several security publications and trackers reported active exploitation prior to patching. These external confirmations underline the urgency of deploying the update on ESU systems.
- Community and trade outlets documented the ESU enrollment flow, the three consumer enrollment methods, manual .msu installation techniques, and the practical size/packaging differences between Windows Update deltas and the offline catalog packages. Those operational details align with Microsoft’s KB guidance on SSU and offline servicing.
Recommended action plan (clear, prioritized)
- Immediate (next 24–72 hours)
- If you manage ESU devices: confirm enrollment status for each device via your management console or the Settings → Windows Update wizard and install KB5068781 (or let Windows Update do so automatically). If enrollment is blocked, apply the out‑of‑band enrollment fix Microsoft published and reattempt enrollment.
- Short term (this month)
- For offline or controlled environments: download KB5068781 from the Microsoft Update Catalog, verify checksums, stage the SSU as required, and deploy to a pilot ring. Monitor for installation anomalies and be ready to restore images if rollback is needed.
- Strategic (next 3–12 months)
- Accelerate migration plans to Windows 11 where feasible; ESU is a temporary bridge and long‑term risk grows as the ecosystem consolidates around newer platforms and tooling. Document the migration roadmap and budget for application compatibility and hardware refresh where required.
Final analysis and conclusion
KB5068781 is a targeted, operationally important update: it not only rolls up monthly security mitigations for ESU‑eligible Windows 10 machines but also addresses the enrollment and servicing bugs that would otherwise block those systems from receiving further security patches. The inclusion of a remediation for CVE‑2025‑62215, a kernel elevation‑of‑privilege that was reported to be actively exploited, elevates this rollup from “routine” to critical for the specific subset of Windows 10 devices that remain on the platform under ESU. Administrators and technically capable home users should treat this release as a priority for ESU‑enrolled devices. Operationally, the update underscores two realities: Microsoft is providing a measured safety net for Windows 10 through ESU, and that safety net is intentionally temporary and gated by account/licensing mechanics and servicing preconditions. For organizations, the sensible path is clear: apply KB5068781 promptly on eligible hosts, validate with pilot deployments, and treat ESU as a migration runway — not a permanent maintenance model. For individuals still on Windows 10, the update is a reminder that staying current means either enrolling in ESU for the short term or moving to a supported OS to remain protected without special licensing constraints.If there is any doubt about which package to choose, the authoritative source remains Microsoft’s KB article and the Microsoft Update Catalog entry for KB5068781; for security‑critical environments, cross‑check CVE entries in the Microsoft Security Update Guide and NVD before final rollout.
Conclusion: KB5068781 is the first ESU cumulative for Windows 10 that restores servicing and enrollment plumbing while shipping security fixes (including a patched kernel zero‑day). Apply it promptly where required, follow Microsoft’s SSU and catalog guidance for offline installs, and use this one‑year ESU window to plan a secure migration rather than relying on ESU indefinitely.
Source: Windows Latest Windows 10 KB5068781 ESU update released, direct download links for offline installer (.msu)
