April 2026 Patch Tuesday: Complete Security Update Guide

April 2026 Patch Tuesday landed on April 14 and it demands your full attention. This month's release combines a heavy payload of critical vulnerability patches with the most important infrastructure deadline of 2026: the Secure Boot certificate expiration on June 26. Coming on the heels of March's problematic KB5079391 rollout, IT teams across Canada are right to approach this month's update cycle with both urgency and caution.

This guide covers every aspect of the April 2026 Patch Tuesday release: what was patched, what the Secure Boot certificate deadline means for your organization, how to avoid a repeat of March's botched deployment, and a structured rollout plan that gets your endpoints protected without causing business disruption.

Hard Deadline: June 26, 2026 — Secure Boot Certificate Expiration

The Windows Production PCA 2011 Secure Boot certificate expires June 26, 2026. Systems that do not receive the Secure Boot revocation update included in April 2026 Patch Tuesday (or a prior monthly rollup) risk boot failures after firmware updates or hardware changes. This is not optional. Budget deployment and testing time now.

April 2026 Patch Tuesday: Quick Reference Summary

Category Details Priority
Release Date April 14, 2026 (Second Tuesday)
Primary KB (Win 11 24H2 / Server 2025) KB5086672 Critical — Deploy Now
Total CVEs Addressed 134 (11 Critical, 119 Important, 4 Moderate) Critical
Zero-Days (Actively Exploited) 3 confirmed in-the-wild exploits Emergency Priority
Secure Boot Certificate Update Included — hard deadline June 26, 2026 Must Deploy Before June 26
LDAP Critical RCE CVE-2026-26647 — CVSS 9.8, unauthenticated RCE Emergency Priority
RDS Stack Vulnerability CVE-2026-26591 — CVSS 9.0, pre-auth RCE Emergency Priority
Windows DNS Server RCE CVE-2026-26529 — CVSS 8.8, authenticated High — 24-48 Hours
Office / Microsoft 365 Apps 5 important-rated vulnerabilities High — 48-72 Hours
Exchange Server 2 elevation-of-privilege patches High — 48-72 Hours
Recommended Community Hold 72 hours from release date (until April 17) Best Practice
Known Issues at Release None confirmed at publication; monitor Windows Release Health Monitor

1. Overview of April 2026 Patch Tuesday

The April 2026 Patch Tuesday release is one of the more consequential months this year. Microsoft addressed 134 CVEs across the Windows ecosystem, Office suite, Exchange Server, .NET Framework, Visual Studio, Azure components, and the Hyper-V hypervisor. Eleven vulnerabilities carry a Critical severity rating, meaning Microsoft assesses them as remotely exploitable without user interaction under common configurations.

Three of those Critical-rated vulnerabilities have confirmed in-the-wild exploitation as of the release date, which shifts them from "patch promptly" to "patch immediately" status. These zero-day-class flaws are being exploited by threat actors who had advance knowledge of the vulnerabilities before the patch was available — a pattern increasingly common in 2025-2026 as the gap between vulnerability discovery and weaponization continues to shrink.

The flagship cumulative update for Windows 11 version 24H2 and Windows Server 2025 is KB5086672. This Windows security update replaces the previous month's KB5079391 and includes all prior fixes in addition to April's new patches. Organizations that skipped March's problematic update can deploy KB5086672 directly without first installing the March rollup — it is fully cumulative and will bring systems current in a single pass.

Beyond the CVEs, April 2026 Patch Tuesday carries the most strategically important component of the year: the Secure Boot DB certificate update that must be applied before the June 26, 2026 hard deadline. This makes the April cycle uniquely significant regardless of the vulnerability content, and it means that even organizations that adopt a conservative "wait and see" patching posture cannot delay this particular release past mid-May without serious risk.

The April 2026 Patch Tuesday also includes updates for Windows 10 versions 22H2 (reaching end-of-life in October 2025 for Home and Pro editions but still receiving updates in enterprise LTSC channels), Windows Server 2019, Windows Server 2022, and associated .NET Framework components. Organizations running a mix of OS versions should consult the Microsoft Security Update Guide (msrc.microsoft.com/update-guide) to identify the correct KB numbers for each platform in their environment.

2. Critical Vulnerabilities Patched This Month

Understanding what was actually fixed helps IT teams communicate urgency to management and prioritize within complex environments. Here are the highest-priority vulnerabilities addressed in this Patch Tuesday April release.

CVE-2026-26647: Windows LDAP Remote Code Execution (CVSS 9.8)

This is the most dangerous vulnerability in the April 2026 Patch Tuesday release. The flaw exists in the Windows Lightweight Directory Access Protocol implementation and allows an unauthenticated attacker on a network-accessible path to execute arbitrary code in the context of the LDAP service. On domain controllers, where LDAP is always enabled and network-accessible, this translates to complete domain compromise without needing credentials of any kind.

Microsoft has confirmed active exploitation in the wild. Organizations should treat this as an emergency patch for all domain controllers. If patching cannot be completed within 24 hours on domain controllers, consider implementing network-level ACLs or firewall rules to restrict LDAP access (TCP 389, TCP 636) to only legitimate client subnets as a temporary mitigation while the patch is tested and staged for deployment.

CVE-2026-26591: Remote Desktop Services Pre-Authentication RCE (CVSS 9.0)

This Windows security update addresses a wormable-class vulnerability in the Remote Desktop Services stack. An attacker can send specially crafted RDP packets to a listening RDP server and achieve remote code execution before any authentication challenge is presented. The vulnerability affects Windows Server 2019, 2022, and 2025 with RDP enabled, as well as Windows 10/11 workstations with Remote Desktop enabled.

With RDP being one of the most commonly exposed services in enterprise environments — particularly in environments that expanded remote access capabilities post-2020 — this vulnerability represents a critical exposure surface. Systems exposed directly to the internet via RDP (even on non-standard ports) should be considered actively under threat. Apply KB5086672 immediately to all RDP-accessible servers and audit your firewall rules to confirm RDP is restricted to VPN or jump-server access paths only.

CVE-2026-26529: Windows DNS Server Remote Code Execution (CVSS 8.8)

This critical vulnerability affects the Windows DNS Server role. An authenticated attacker who can reach the DNS service (typically within the corporate network) can trigger a heap-based buffer overflow leading to code execution as SYSTEM on the DNS server. While authentication is required, the bar is low: any domain user account is sufficient to trigger the exploit.

In typical Windows environments, the DNS Server role runs on domain controllers. Patching CVE-2026-26529 is therefore aligned with patching the LDAP flaw above — a single deployment of KB5086672 to your domain controllers addresses both critical vulnerabilities simultaneously. This reinforces why domain controller patching is the absolute first priority in this Patch Tuesday April cycle.

Additional Notable CVEs in This Release

3. Secure Boot Certificate Expiration: June 26, 2026 Deadline

The Secure Boot certificate expiration is not a vulnerability patch — it is a mandatory infrastructure update with a hard calendar deadline that cannot be extended by any amount of testing delay or deployment caution.

Background: What Is Expiring and Why

Secure Boot relies on a chain of trust: your PC's UEFI firmware trusts a set of certificates stored in the Secure Boot DB, and those certificates are used to verify that the Windows bootloader is authentic before allowing it to execute. The "Windows Production PCA 2011" certificate, which is the root certificate used to verify the Windows boot chain on hundreds of millions of devices, was issued in 2011 with a 15-year validity period. It expires on June 26, 2026.

Microsoft has issued a replacement certificate (Windows UEFI CA 2023) and has been delivering Secure Boot database updates through monthly Windows security updates since late 2024. The April 2026 Patch Tuesday cycle includes the final wave of this migration as part of KB5086672 and related servicing stack updates. Organizations whose endpoints have received any monthly rollup since December 2024 may already have the updated certificate; however, the revocation component (which revokes trust in the old certificate) is delivered separately and must be confirmed.

What Happens If You Miss the Deadline

After June 26, 2026, the old certificate expires. The practical consequences depend on firmware behavior and what activity occurs after the deadline:

Timeline: You Have 73 Days from April 14

The June 26 deadline leaves approximately 73 days from today. For organizations with thousands of endpoints, testing, staged rollout, exception handling, and compliance verification can consume all of that time. Organizations that historically take 6-8 weeks to reach full patch compliance should begin broad deployment of the Secure Boot component by May 1 at the latest.

How to Verify Secure Boot Certificate Status on Your Fleet

Before deploying the April 2026 Patch Tuesday updates, audit your Secure Boot status across the fleet. On individual systems: open System Information (run msinfo32) and check the "Secure Boot State" field. The value should read "On." If it reads "Off" or "Unsupported," those systems need separate BIOS/UEFI configuration review.

At scale, verify Secure Boot state via PowerShell:

Confirm-SecureBootUEFI

Run on each endpoint or via Invoke-Command for remote execution. Returns True (Secure Boot enabled and active), False (supported but disabled in BIOS), or throws an exception (Secure Boot not supported by firmware). Log results to a CSV for fleet-wide visibility before deploying the certificate update.

4. Lessons Learned from March's Botched KB5079391

March 2026 Patch Tuesday was a cautionary tale for enterprise IT teams across Canada and globally. KB5079391, the cumulative update for Windows 11 24H2, caused a wave of BitLocker recovery screens on first reboot after installation. The problem manifested specifically on AMD Ryzen systems with TPM 2.0 chips in fTPM (firmware TPM) configuration where the BitLocker recovery key had not been pre-staged to Active Directory or Azure AD.

Affected users were greeted with the BitLocker recovery prompt on boot. Those who had their recovery key accessible could unlock and proceed normally. Those without it — the majority of affected users in environments without systematic key escrow — faced a complete boot failure with no straightforward self-service recovery path. Enterprise helpdesks in organizations that had deployed KB5079391 broadly before testing reported 3-8% of AMD endpoints requiring manual intervention, consuming significant IT support hours and causing measurable business disruption.

Root Cause Analysis

The root cause was a change in how KB5079391 handled fTPM measurement values used by BitLocker. The update altered a PCR (Platform Configuration Register) value included in BitLocker's boot trust calculation on AMD fTPM implementations. BitLocker interpreted the changed PCR measurement as a potential tampering event and demanded the recovery key as proof of authorized access — exactly as designed, but triggered incorrectly due to the update's side effect on AMD fTPM behavior.

Microsoft released an out-of-band patch (KB5080757) within 72 hours, but by that point thousands of enterprise endpoints had already triggered recovery events. The episode was fully preventable with proper pre-deployment practices — practices that also apply to every future Patch Tuesday April and monthly release.

What to Do Differently This Month

Current Status for KB5086672

At publication time (April 14, 2026), no deployment issues have been reported for KB5086672 on any platform. The Microsoft Windows Release Health dashboard shows no active advisories. The 72-hour community hold runs until April 17 — begin pilot deployment on or after that date.

5. Safe Deployment Steps for IT Teams

The following deployment workflow applies whether you manage 50 endpoints or 5,000. Adapt timing and tooling to your environment, but preserve the overall structure for every critical April 2026 Patch Tuesday and future monthly release.

1

Complete Pre-Deployment Prerequisites (Before April 17)

Before approving any updates, complete these prerequisites: verify BitLocker recovery key escrow for all encrypted endpoints; document AMD vs. Intel CPU distribution across the fleet; confirm VM snapshot schedules for all virtual machines; identify critical business systems (ERP, line-of-business apps, clinical systems) requiring extended testing windows; and communicate the upcoming maintenance schedule to stakeholders. This preparation step eliminates the majority of deployment incidents before they occur.

2

Download KB5086672 and Review Release Notes

Download KB5086672 from the Microsoft Update Catalog (catalog.update.microsoft.com) and review the full release notes on the Microsoft Support page for the KB number. Pay particular attention to the "Known Issues" section and any prerequisite servicing stack updates. For Windows 11 24H2 deployments, verify that Servicing Stack Update KB5039708 or later is already present — it should be on any system that received a monthly update in February or March 2026. Also review the Security Update Guide at msrc.microsoft.com for the complete CVE list with CVSS scores.

3

Deploy to Pilot Ring (Start April 17 or Later)

After the 72-hour community monitoring window clears on April 17, approve KB5086672 for your pilot ring: 5-10% of endpoints selected to represent your hardware diversity. The pilot ring must include at least one AMD Ryzen system, at least one Intel system, at least one domain controller in a non-critical AD site (or a dedicated test DC), at least one Remote Desktop Services server, and workstations from each major hardware model in your fleet. Monitor for 48 hours. Success criteria: no boot failures, BitLocker status unchanged, LDAP authentication working, RDP connectivity working, Secure Boot state confirmed via Confirm-SecureBootUEFI.

4

Patch Domain Controllers and Critical Servers First

After the pilot passes, patch domain controllers and DNS servers before workstations. This is an inversion of the typical workstation-first sequence — justified by the unauthenticated LDAP RCE (CVE-2026-26647) that puts domain controllers at immediate risk from internal network attackers. Patch one DC at a time in multi-DC environments. After each DC is patched and rebooted, verify: AD replication with repadmin /showrepl, DNS resolution from multiple clients, Kerberos authentication by logging in from a test workstation, and SYSVOL/NETLOGON share accessibility. Only proceed to the next DC after confirming the preceding one is healthy.

5

Broad Workstation Rollout (Around April 19-21)

After pilot and server phases pass without incident, approve the update for the broad workstation ring covering 50-80% of endpoints. Use staggered delivery windows: deploy to one organizational unit, office, or subnet group per day if helpdesk capacity is a concern. Configure updates to download and install during off-hours and reboot during the maintenance window (for example, 2:00 AM to 4:00 AM local time). For remote and laptop users, send advance communication requesting they connect to power and remain connected to the corporate network (VPN or on-site) overnight during the deployment window.

6

Mop-Up: Stragglers and Exception Handling

After the broad ring, use your patch management console to identify non-compliant systems: devices that were offline, VPN-unreachable, or in deliberate exception groups. Chase these down aggressively given the June 26 Secure Boot deadline. Maintain a formal exceptions log for any system that legitimately cannot be patched (end-of-life hardware, vendor-controlled clinical devices, isolated OT systems) with documented business justification and compensating controls such as network segmentation and enhanced monitoring.

6. Testing Strategy Before Rollout

Structured testing is what separates a smooth April 2026 Patch Tuesday deployment from an incident. These tests should be completed during the pilot ring phase before approving updates for production systems.

Application Compatibility Testing

Every critical Windows security update has the potential to affect application behavior through kernel-level changes. For April 2026 Patch Tuesday, the areas most likely to see compatibility friction are:

Performance Baseline Validation

After applying the patch to pilot systems, run a login and application load benchmark using a consistent workflow. Critical patches addressing speculative execution vulnerabilities (common in recent years) have demonstrated measurable performance regressions on certain workloads. If your environment runs latency-sensitive operations (database queries, real-time processing, video editing), capture before and after metrics during the pilot phase to detect any regression before it affects production users.

Secure Boot Functional Test Checklist

After applying KB5086672 on pilot systems, complete this Secure Boot verification sequence:

  1. Reboot the system twice and confirm it boots normally without any UEFI error messages or unusual boot delays
  2. Run Confirm-SecureBootUEFI and confirm it returns True
  3. Verify BitLocker status is unchanged using manage-bde -status C:
  4. Check Event Viewer under System log for any Secure Boot or BitLocker-related errors in the period following the reboot
  5. On at least one test system, simulate a firmware scenario by accessing BIOS, making a minor change (e.g., adjusting boot order), saving, and confirming the system still boots Windows normally

7. Rollback Procedures If Updates Fail

Have your rollback plan documented and tested before beginning deployment, not after something breaks in production. These procedures cover the most common failure modes for the April 2026 Patch Tuesday update cycle.

Rolling Back an Individual Endpoint

1

Windows Recovery Environment Method (Boot Failure)

If the system enters a boot failure after applying KB5086672: hold Shift on the sign-in screen and click Restart, or boot from Windows installation media and select Repair. Navigate to Troubleshoot > Advanced Options > Uninstall Updates and select Uninstall latest quality update. Windows removes KB5086672 and restores the previous build state. This option is available for approximately 10 days after installation before Windows cleans up the rollback data as part of disk cleanup.

2

Command-Line Uninstall (System Boots But Has Issues)

If the system boots but exhibits application compatibility issues or performance problems after KB5086672, open an elevated Command Prompt and run:

wusa /uninstall /kb:5086672 /quiet /norestart

Reboot manually after completion. Verify removal by checking Settings > Windows Update > Update History. The KB should appear as "Uninstalled" in the history. Report the issue with reproduction steps to your patch management team and open a Microsoft support case if multiple systems are affected.

3

WSUS / Intune Rollback for Managed Fleets

In WSUS: navigate to Updates > All Updates, locate KB5086672, right-click and select Decline. On affected clients, run wuauclt /detectnow or usoclient StartScan to trigger detection. Note that declining in WSUS prevents future installation but does not automatically remove it from systems that already received it. For automated removal across a fleet, deploy a PowerShell remediation script via Group Policy or MECM that runs wusa /uninstall /kb:5086672 /quiet /norestart and schedules a reboot.

4

BitLocker Recovery Scenario (Lesson from March)

If a system displays the BitLocker recovery screen after the update (as happened with March's KB5079391), retrieve the 48-digit recovery key from one of these sources: Active Directory (AD Users and Computers > locate the computer object > BitLocker Recovery tab), Azure AD Entra admin center (Devices > select the device > Recovery Keys tab), or the user's Microsoft account at account.microsoft.com/devices/recoverykey. Enter the key at the boot prompt. The system will boot normally. After recovery, do not immediately re-apply the update — investigate why BitLocker recovery was triggered and confirm the issue is not reproducible before re-patching.

Domain Controller Rollback Considerations

Rolling back a domain controller patch requires extra care because AD replication propagates changes to other DCs during the patching window. Before patching any DC, take a system state backup using wbadmin start systemstatebackup or a supported third-party backup solution, or take a VM snapshot if the DC is virtualized. If post-patch DC behavior is abnormal: use repadmin /showrepl to assess replication health, seize operations master (FSMO) roles from the affected DC to a healthy DC before proceeding with rollback, then roll back using the system state backup. Monitor AD replication for 24 hours after any DC rollback to confirm no lingering replication conflicts.

8. Enterprise Patch Management Best Practices

The April 2026 Patch Tuesday cycle is a useful opportunity to review and reinforce your enterprise patch management fundamentals. Organizations that consistently handle Patch Tuesday smoothly share a few common structural practices.

Define Tiered SLAs for Patch Deployment

A written patch policy with defined SLAs removes ambiguity from deployment decisions and creates an auditable compliance record. Recommended tiers for a Canadian SMB or mid-enterprise environment:

Automate Pre-Deployment Health Checks

Manual pre-deployment checks are error-prone under time pressure. Automate these verifications using PowerShell or your MDM platform to run automatically before each update deployment ring begins:

Integrate Patch Cycles with Change Management

Each Patch Tuesday deployment should be a registered change in your ITSM system (ServiceNow, Jira Service Management, Freshservice, or similar). This creates a timestamp-correlated record that links helpdesk tickets to the patch deployment window, making root cause analysis faster when issues do occur. For Critical patches with CVE context, include the CVSS score and exploitation status in the change record to document the risk-based justification for deployment speed. This documentation is increasingly required for cyber insurance claims and compliance audits.

Maintain Documented Vendor Contact Lists

For complex deployment environments, identify in advance which vendor support numbers to call for each category of post-patch incident: Microsoft Premier Support for Windows OS issues, your EDR/AV vendor's enterprise support line for security agent conflicts, your hardware OEM for UEFI/firmware-related boot failures, and your backup vendor for any recovery operation. Having these contacts pre-documented saves critical time when an incident is actively unfolding during a patching window.

9. Timeline and Priority Matrix

Use this priority matrix to sequence your April 2026 Patch Tuesday deployment across system types. Timelines are recommendations based on risk profile; adjust based on your specific environment, existing compensating controls, and the 72-hour community hold.

Emergency Priority (Within 48 Hours of April 17)

All domain controllers (LDAP RCE CVE-2026-26647). All servers with RDP exposed to the internet (RDS pre-auth RCE CVE-2026-26591). Internal DNS servers (DNS Server RCE CVE-2026-26529). Any Windows server with internet-facing LDAP or RDP services.

Critical Priority (Within 5-7 Days)

All remaining Windows Server systems. Exchange Server on-premises (EoP patches). Hyper-V hosts (guest-to-host escape CVE-2026-26602). RDS session hosts not in emergency category. Any server running the DNS Server role.

High Priority (Within 14 Days)

General workstation fleet via broad deployment ring. Microsoft 365 Apps update deployment (Office RCE patch). Developer and power-user workstations. Remote endpoints and VPN-connected laptops. Windows 10 LTSC systems if still in support.

Standard Priority (Within 30 Days)

Air-gapped or isolated systems requiring change control. OT-adjacent systems with vendor approval requirements. Test and development environment VMs. Non-critical service accounts on isolated subnets.

Secure Boot Certificate: Special Priority Track

The Secure Boot certificate update runs on a separate mandatory track dictated by the June 26 deadline. Map your deployment completion date backwards from June 26, accounting for your slowest compliance path. Most organizations need 6-8 weeks to reach 95% or higher compliance across managed fleets, including stragglers and exception handling. This means broad deployment of the Secure Boot component must begin no later than May 1. Any organization that has not started the Secure Boot update rollout by May 15 is at significant risk of missing the June 26 deadline for a meaningful percentage of their fleet.

10. Tools for Patch Management in 2026

The right tooling makes enterprise patch management repeatable, auditable, and substantially less stressful each month. Here is a practical overview of the tools relevant to deploying the April 2026 Patch Tuesday release.

Windows Server Update Services (WSUS)

WSUS remains the baseline patch management tool for on-premises Windows environments without Microsoft 365 / Intune licensing. For the April 2026 Patch Tuesday cycle, configure WSUS computer groups to match your deployment rings. Use the "Approval" workflow to control when each ring receives the update: approve for Test and Pilot groups on April 17, then approve for Production groups after your pilot success criteria are met. Monitor compliance through Reports > Update Reports. A key WSUS limitation to be aware of: the console does not natively surface community-reported issues; always cross-reference with the Microsoft Release Health dashboard manually.

Microsoft Intune and Windows Autopatch

For organizations using Microsoft Intune, Windows Autopatch provides automated ring-based deployment with built-in quality gates. Autopatch automatically pauses deployments if post-patch device error rates exceed configurable thresholds and provides deployment health dashboards in the Intune admin center. The April 2026 Patch Tuesday cumulative update will appear in Autopatch's Test ring automatically; review the deployment plan in the admin center by April 14 and validate ring assignments and deferral configurations before the community hold clears on April 17.

Microsoft Endpoint Configuration Manager (MECM)

MECM offers the most granular control for large enterprise environments. For this cycle, create a Software Update Group for the April 2026 Patch Tuesday content and deploy with maintenance window scheduling to enforce off-hours installation. Use Compliance reports to track deployment progress across the hierarchy. MECM's Orchestration Groups feature is ideal for sequenced domain controller patching — configure a maximum number of simultaneously patching members set to 1, with pre and post-maintenance scripts running health checks between each DC.

Third-Party Patch Management Platforms

Tools such as Ivanti Patch for Endpoints, ManageEngine Patch Manager Plus, and NinjaRMM provide multi-OS patch management (covering macOS and Linux alongside Windows) and are common in MSP and multi-client enterprise environments. These tools ingest Microsoft Update metadata and support the same ring-based deployment logic as native Microsoft tools. For the April 2026 Patch Tuesday cycle, verify that your third-party tool has ingested the updated vulnerability database and correctly identifies KB5086672 as a Critical update before approving deployment in your pilot ring.

Essential PowerShell Commands for This Cycle

Get-HotFix -Id KB5086672

Verify KB5086672 is installed on a local or remote system. Returns installation date and time. Use via Invoke-Command for remote verification across your fleet.

Confirm-SecureBootUEFI

Check Secure Boot state. Returns True (enabled), False (supported but disabled), or an exception (not supported). Run before and after KB5086672 installation to confirm no Secure Boot disruption.

manage-bde -status C:

Display full BitLocker status for the system drive. Verify protection is On and recovery key protectors are present before and after the update. Helps detect any BitLocker state change triggered by the patch.

repadmin /showrepl

Check Active Directory replication status after patching domain controllers. All replication partners should show Last Attempt Time that is recent and Last Success Time with zero consecutive failures.

wusa /uninstall /kb:5086672 /quiet /norestart

Uninstall KB5086672 from an endpoint that is experiencing post-patch issues. Run from an elevated command prompt. Reboot manually after completion.

Microsoft Security Update Guide (SUG)

The Microsoft Security Update Guide at msrc.microsoft.com/update-guide is the authoritative source for CVE details, CVSS scores, exploitation status, affected product matrices, and FAQ for every Patch Tuesday April release. Filter by the April 2026 release date and export the full vulnerability list for your documentation and risk assessment records. The SUG also tracks post-release revisions — this is how Microsoft communicates when a patch is superseded by an out-of-band fix, as happened with KB5079391 in March. Subscribe to the Microsoft Security Response Center blog for email notifications of advisory updates.

Need Help Deploying April 2026 Patch Tuesday?

IT Cares handles the full patch management lifecycle for Canadian businesses — from monthly planning and pilot testing to staged rollout, compliance reporting, and emergency remediation. We ensure your systems stay protected and the June 26 Secure Boot deadline is met. Call us for a free consultation.

Frequently Asked Questions: April 2026 Patch Tuesday

What is the most critical update in April 2026 Patch Tuesday?
The most critical individual update is the LDAP Remote Code Execution patch (CVE-2026-26647, CVSS 9.8) included in KB5086672. This vulnerability allows an unauthenticated attacker to execute arbitrary code on any Windows system with the LDAP service accessible — which includes every domain controller on every corporate network. It has confirmed active exploitation in the wild. All domain controllers should receive KB5086672 within 48 hours of the community hold window clearing on April 17. The accompanying RDS pre-auth RCE (CVE-2026-26591, CVSS 9.0) is equally urgent for any internet-facing Remote Desktop Services servers.
What is the Secure Boot certificate expiration and how does it affect my organization?
The Windows Production PCA 2011 Secure Boot certificate expires June 26, 2026. After expiration, systems that receive a UEFI firmware update refreshing the Secure Boot DB may fail to boot Windows if they have not received the certificate transition update included in April 2026 Patch Tuesday (KB5086672) or a prior monthly rollup. New hardware purchased after June 26 may also ship without the old certificate, causing imaging failures. Organizations must deploy KB5086672 across all managed endpoints before June 26. Begin broad deployment no later than May 1 to allow sufficient time for compliance verification and remediation of stragglers before the hard deadline.
What went wrong with KB5079391 in March 2026 and how do I prevent a repeat?
KB5079391 (March 2026 Patch Tuesday) triggered BitLocker recovery screens on AMD Ryzen systems with firmware TPM configurations. The update altered PCR measurement values in the AMD fTPM implementation, causing BitLocker's tamper detection to demand the recovery key on first post-update reboot. Organizations without pre-staged BitLocker recovery keys in Active Directory or Azure AD faced boot failures requiring manual IT intervention. To prevent a repeat with KB5086672: verify BitLocker recovery key escrow for all encrypted endpoints before deployment; include at least one AMD Ryzen system in your pilot ring; observe the 72-hour community hold window (April 17 or later before starting pilot); and monitor the Windows Release Health dashboard within 24 hours of the release date for any new advisory notices.
How should I test April 2026 Patch Tuesday before deploying to production?
Use a three-ring deployment model. Pilot ring (start April 17): 5-10% of endpoints representing hardware diversity, including AMD Ryzen and Intel systems, at least one domain controller in a non-critical AD site, one RDS session host, and representative user workstations. Test LDAP authentication, RDP connectivity, Secure Boot state with Confirm-SecureBootUEFI, BitLocker status with manage-bde -status C:, and all major line-of-business applications. Monitor for 48 hours before advancing. Broad ring (around April 19-21): 50-80% of workstations after pilot passes. Production ring: remaining endpoints after broad ring clears without critical issues. Throughout all rings, monitor the Microsoft Windows Release Health dashboard for any KB5086672 advisories.
What is the rollback procedure if KB5086672 causes issues on my systems?
For endpoints that can boot but have issues: run wusa /uninstall /kb:5086672 /quiet /norestart from an elevated command prompt, then reboot. For systems in boot failure: boot into Windows Recovery Environment (hold Shift + click Restart, or use installation media), navigate to Troubleshoot, Advanced Options, Uninstall Updates, and choose Uninstall latest quality update. For BitLocker recovery screens: retrieve the 48-digit recovery key from Active Directory (BitLocker Recovery tab on the computer object), Azure AD Entra admin center under Devices and Recovery Keys, or the user's Microsoft account. For WSUS-managed environments: decline KB5086672 in the WSUS console and run wuauclt /detectnow on affected clients. Always document rollbacks and report issues to Microsoft via a support case with event logs and a dxdiag report.

Questions & Comments

MR
Marcus R., IT Manager
April 14, 2026

Finally a clear explanation of the Secure Boot certificate issue with concrete dates. We had this flagged internally but never got a proper deadline-oriented action plan. Starting our deployment prep today. Thank you.

SL
Sandra L., Senior SysAdmin
April 14, 2026

We got hit by the KB5079391 BitLocker incident in March on six AMD laptops. This guide covers exactly what we should have had in place beforehand. The BitLocker key escrow verification step is now a mandatory pre-flight check in our runbook.

TC
Trevor C.
April 14, 2026

The priority matrix is exactly what I needed to justify an emergency deployment window to management this week. CVSS 9.8 unauthenticated RCE on domain controllers — that's not a debate, that's an incident waiting to happen.

Let IT Cares Handle Your Patch Management

Staying on top of critical vulnerabilities, Secure Boot deadlines, safe deployment procedures, and rollback planning is a full-time job. IT Cares provides fully managed patch management for businesses across Canada — every Patch Tuesday cycle, handled from testing through compliance reporting. Contact us today for a free managed IT consultation.

Need this fixed now? We do it remotely in 30 min →
Book for $59 Call Now