8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
32.3%
This security update resolves a Microsoft Word remote code execution vulnerability and Microsoft SharePoint Server elevation of privilege vulnerability. To learn more about the vulnerabilities, see the following security advisories:
Notes:
This public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:
This security update contains improvements in SharePoint Enterprise Server 2016:
To improve the security of customer environments, Antimalware Scan Interface (AMSI) integration is now enabled by default for all new and existing web applications. For more information, see Configure AMSI integration with SharePoint Server.
Improves AMSI integration by not blocking web requests if AMSI can’t successfully inspect the web request. A new health analyzer rule will notify SharePoint farm administrators if AMSI protection isn’t functioning as expected.
This security update also contains an improvement in SharePoint Enterprise Server 2016. To get the improvement, you have to install KB 5002501 together with this update.
Adds a new health analyzer rule to check whether AMSI integration is enabled, and, if it is, to confirm that AMSI protection is functioning as expected. If AMSI protection isn’t functioning as expected, the new health analyzer rule will notify SharePoint farm administrators through its health analyzer report, and provide recommended steps to fix the issue. For more information, see Antimalware Scan Interface (AMSI) protection may not be working (SharePoint Server).
New security enhancements in SharePoint Server might cause custom .aspx files not to be displayed under certain circumstances. Browsing to such a page generates a “92liq” event tag in SharePoint Unified Logging System (ULS) logs. For more information, see ASPX file cannot be displayed when you create a custom web part (KB5030804).
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
To get the standalone package for this update, go to the Microsoft Update Catalog website.
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
For deployment information about this update, see Deployments - Security Update Guide.
This security update replaces previously released security update 5002453.
File name | SHA256 hash |
---|---|
sts2016-kb5002494-fullfile-x64-glb.exe | E773C65A7D0F2736786118DDBEBAC03FA4D7DACAFD9167F42E5F3F7BBE1B575E |
Download the list of files that are included in security update 5002494.
Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
32.3%