CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
21.5%
This security update resolves a Microsoft SharePoint Server remote code execution vulnerability. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2024-21426.
Notes:
This security update introduces the SharePoint Server Subscription Edition Version 24H1 feature update. This feature update will be included in all SharePoint Server Subscription Edition public updates going forward. For more information about this feature update, see New and improved features in SharePoint Server Subscription Edition Version 24H1.This security update contains improvements and fixes for the following nonsecurity issues in SharePoint Server Subscription Edition:
Add-PSSnapin Microsoft.SharePoint.PowerShell
$farm = Get-SPFarm
$farm.EnableCSPHeaderForPage = $false
$farm.Update()
Could not load file or assembly ‘Microsoft.Owin, Version=3.0.1.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35’ or one of its dependencies. The system cannot find the file specified.
After you install this security update, run the upgrade action by using one of the following methods:
* Start the SharePoint Products and Technologies Configuration Wizard (PSConfigUI.exe) and upgrade.
* Run the SharePoint Products Configuration Wizard (PSCONFIG.EXE) command line tool:
PSCONFIG.EXE -cmd secureresources -cmd services -install -cmd installfeatures -cmd applicationcontent -install -cmd upgrade -inplace b2b -wait
* Run the following PowerShell commands:
Initialize-SPResourceSecurity
Install-SPService
Install-SPFeature -AllExistingFeatures
Install-SPApplicationContent
Upgrade-SPFarm
After you run this upgrade action, the error message disappears.This behavior is by design because the new component version must be registered in SharePoint Server’s Web.config files.This issue will affect the ability of users to do “zero downtime patching” (ZDP), as described in SharePoint Server zero downtime patching steps. This is because SharePoint sites won’t be accessible until the upgrade action is run. Users should be prepared to install the update during a maintenance window when downtime is acceptable.Alternatively, users can avoid downtime by manually editing the Web.config file for each of their web applications immediately after the update is installed on a given server and before the server is returned to the load balancing rotation. To do this, follow these steps:
1. Locate the following lines in the configuration >runtime>assemblyBinding section of the Web.config file:<dependentAssembly>
<assemblyIdentity name=“Microsoft.Owin” publicKeyToken=“31bf3856ad364e35” culture=“neutral” />
<bindingRedirect oldVersion=“0.0.0.0-3.0.1.0” newVersion=“3.0.1.0” />
</dependentAssembly>
2. Replace the located text with the following lines:<dependentAssembly>
<assemblyIdentity name=“Microsoft.Owin” publicKeyToken=“31bf3856ad364e35” culture=“neutral” />
<bindingRedirect oldVersion=“0.0.0.0-4.2.2.0” newVersion=“4.2.2.0” />
</dependentAssembly>
After the update is installed on all servers, users can run the upgrade action. Manually editing the Web.config file won’t interfere with the upgrade action.
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
To get the standalone package for this update, go to the Microsoft Update Catalog website.
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
For deployment information about this update, see Deployments - Security Update Guide.
This security update replaces previously released security update 5002540.
File name | SHA256 hash |
---|---|
uber-subscription-kb5002564-fullfile-x64-glb.exe | F4E1747B580FCF13385E3E51BF8F115A965425788CC1B681080F9EF92D8D0ECD |
Download the list of files that are included in security update 5002564.
Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security
The following table summarizes some of the most important changes to this topic.Date | Description |
---|---|
March 20, 2024 | Added a “Known issues in this update” section to describe an issue that users may experience. |
April 9, 2024 | Added a new item to the “Known issues in this update” section (cannot join servers). |