7.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N
7.2 High
AI Score
Confidence
High
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.087 Low
EPSS
Percentile
94.4%
This security update resolves a Microsoft SharePoint remote code execution vulnerability, SharePoint spoofing vulnerability, SharePoint Server information disclosure vulnerability, and SharePoint Server remote code execution vulnerability. To learn more about the vulnerabilities, see the following security advisories:
**Note:**To apply this security update, you must have the release version of Microsoft SharePoint Enterprise Server 2016 installed on the computer.
This public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:
This update contains security and reliability improvements.This security update also contains fixes and improvements for the following nonsecurity issues in SharePoint Server 2016:
**8gaol Unable to access this sensitive property : <sensitive property name> from outer assembly.**To fix this issue, install KB5002002 and follow the guidance in KB5004581 to enable trusted third-party assemblies.
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
To get the standalone package for this update, go to the Microsoft Update Catalog website.
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
For deployment information about this update, see Security update deployment information: June 8, 2021 (KB5004128).
This security update replaces previously released security update 5001917.
File name | SHA256 hash | |
---|---|---|
sts2016-kb5001946-fullfile-x64-glb.exe | 9725FE949F7BCC1BD66DD9E4394DB1AD77061A623BDD0004BBAFBE03481397E8 |
Download the list of files that are included in security update 5001946.
Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security
The following table summarizes some of the most important changes to this topic.Date | Description |
---|---|
June 29, 2021 | Added a known issue in the “Known issues in this update” section. |
August 10, 2021 | Updated the “Known issues in this update” section to provide a resolution to the issue. |
7.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N
7.2 High
AI Score
Confidence
High
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
0.087 Low
EPSS
Percentile
94.4%