Lucene search

K
mskbMicrosoftKB5014702
HistoryJun 14, 2022 - 7:00 a.m.

June 14, 2022—KB5014702 (OS Build 14393.5192)

2022-06-1407:00:00
Microsoft
support.microsoft.com
64

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.971 High

EPSS

Percentile

99.8%

June 14, 2022—KB5014702 (OS Build 14393.5192)

NEW 06/14/22
IMPORTANT On May 19, 2022, we released an out-of-band (OOB) update to address an issue that might cause machine certificate authentication failures on domain controllers. If you haven’t installed the May 19, 2022 or later releases, then installing this June 14, 2022 update will also address that issue. For more information, see theBefore installing this update
section in this article.

**Note:**To improve the information presented in the history pages and related KBs and make them more useful to our customers, we have created an anonymous survey for you to share your comments and feedback.

11/19/20
For information about Windows update terminology, see the article about the types of Windows updates and the monthly quality update types. For an overview of Windows 10, version 1607, see its update history page.

Highlights

  • Addresses security issues for your Windows operating system.

Improvements

This security update includes quality improvements. Key changes include:

  • Provides a Group Policy that administrators can use to enable customers to use the Ctrl+S (Save As) keyboard shortcut in Microsoft Edge IE Mode.
  • Addresses an issue that prevents printing from operating properly for some low integrity process apps.
  • Addresses an issue that causes print failures when a low integrity level (LowIL) application prints to a null port.
  • Addresses an issue that prevents you from signing in to Citrix servers that have enabled the Interactive logon: Require smart card security policy setting.
  • Addresses an issue that causes a mismatch between a Remote Desktop session’s keyboard and the Remote Desktop Protocol (RDP) client when signing in.
  • Addresses an issue that prevents the file system control code (FSCTL_SET_INTEGRITY_INFORMATION_EX) from handling its input parameter correctly.
  • Addresses an elevation of privilege (EOP) vulnerability under CVE-2022-30154 for the Microsoft File Server Shadow Copy Agent Service. To become protected and functional, you must install the June 14, 2022 or later Windows update on both the application server and the file server. The application server runs the Volume Shadow Copy Service (VSS)-aware application that stores data on the remote Server Message Block 3.0 (or higher) shares on a file server. The file server hosts the file shares. If you don’t install the update on both machine roles, backup operations carried out by applications, which previously worked, might fail. For such failure scenarios, the Microsoft File Server Shadow Copy Agent Service will log FileShareShadowCopyAgent event 1013 on the file server. For more information, see KB5015527.
    If you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device. For more information about security vulnerabilities, please refer to the new Security Update Guide website and the June 2022 Security Updates.

Known issues in this update

Symptom Workaround
After installing this update, Windows devices might be unable use the Wi-Fi hotspot feature. When attempting to use the hotspot feature, the host device might lose the connection to the internet after a client device connects. This issue is addressed in KB5015808.
After installing this update, Windows Servers that are using the Routing and Remote Access Service (RRAS) might be unable to correctly direct internet traffic. Devices that connect to the server might fail to connect to the internet, and servers can lose connection to the internet after a client device connects. This issue is addressed in KB5015808.
After installing updates released June 14, 2022, or later, PowerShell Desired State Configuration (DSC) using an encrypted the PSCredential property might fail when decrypting the credentials on the target node. This failure will result in a password related error message, similar to, “The password supplied to the Desired State Configuration resource <resource name> is not valid. The password cannot be null or empty.”NoteEnvironments which use non-encrypted PSCredential properties will not experience the issue.DSC is a management platform in PowerShell that enables administrators to manage IT and development infrastructure with configuration as code. This issue is not likely to be experienced by home users of Windows. This issue is addressed in KB5015808.

How to get this update

Before installing this updateFor machine certificate authentication considerations that affect Network Policy Server (NPS) and other scenarios, do one of the following:

  • Install this June 14, 2022 update on all intermediate or application servers that pass authentication certificates from authenticated clients to the domain controller (DC) first. Then install this update on all DC role computers.OR
  • Pre-populate CertificateMappingMethods to 0x1F as documented in the Registry key information section of KB5014754 on all DCs. Delete the CertificateMappingMethods registry setting only after the June 14, 2022 update has been installed on all intermediate or application servers and all DCs.
    Note Adding, modifying, or removing the CertificateMappingMethods registry setting does not require a device restart.Microsoft strongly recommends you install the latest servicing stack update (SSU) for your operating system before installing the latest cumulative update (LCU). SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU and applying Microsoft security updates. For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.If you are using Windows Update, the latest SSU (KB5014026) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the Microsoft Update Catalog.Install this update****Release Channel|Available|Next Step
    —|—|—
    Windows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update.
    Windows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies.
    Microsoft Update Catalog| Yes| To get the standalone package for this update, go to the Microsoft Update Catalog website.
    Windows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure Products and Classifications as follows:Product: Windows 10Classification: Security Updates File informationFor a list of the files that are provided in this update, download the file information for cumulative update 5014702.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.971 High

EPSS

Percentile

99.8%