CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
21.5%
This security update resolves a Microsoft SharePoint Server remote code execution vulnerability. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2024-21426.
Notes:
This public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:
This security update contains an improvement and a fix for the following nonsecurity issue in SharePoint Enterprise Server 2016:
Add-PSSnapin Microsoft.SharePoint.PowerShell
$farm = Get-SPFarm
$farm.EnableCSPHeaderForPage = $false
$farm.Update()
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
To get the standalone package for this update, go to the Microsoft Update Catalog website.
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
For deployment information about this update, see Deployments - Security Update Guide.
This security update replaces previously released security update 5002541.
File name | SHA256 hash |
---|---|
sts2016-kb5002559-fullfile-x64-glb.exe | 660E62B2F27C59213A0825636E1B32F57565B27FA90F85D4252FF2D17482E4E9 |
Download the list of files that are included in security update 5002559.
Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security