Lucene search

K
mskbMicrosoftKB5030216
HistorySep 12, 2023 - 7:00 a.m.

September 12, 2023—KB5030216 (OS Build 20348.1970)

2023-09-1207:00:00
Microsoft
support.microsoft.com
25

8.8 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

5.8 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

77.1%

September 12, 2023—KB5030216 (OS Build 20348.1970)

For information about Windows update terminology, see the article about the types of Windows updates and the monthly quality update types. For an overview of Windows Server 2022, see its update history page. NoteFollow @WindowsUpdate to find out when new content is published to the Windows release health dashboard.

Improvements

This security update includes quality improvements. When you install this KB:

  • New! This update affects firewall settings. You can now make changes that allow you to configure application group rules.
  • This update supports daylight saving time (DST) changes in Israel.
  • This update addresses an issue that affects Server Message Block (SMB). You cannot access the SMB shared folder. The errors are, “Not enough memory resources” or “Insufficient system resources.”
  • The update addresses an issue that affects scheduled tasks. The tasks fail when they use stored local user account credentials. This occurs when you enable Credential Guard. The error message is "2147943726: ERROR_LOGON_FAILURE (The user name or password is incorrect).”
  • This update addresses an issue that affects the Local Security Authority Subsystem Service (LSASS). It stops responding. This occurs when you use Azure Virtual Desktop (AVD).** **
  • The update addresses an issue that affects those who use Windows Update for Business. After you are asked to change your password at sign in, the change operation fails. Then you cannot sign in. The error code is 0xc000006d.
  • This update addresses an issue that affects the Local Security Authority Subsystem Service (LSASS) process. It might stop responding. Because of this, the machine restarts. The error is 0xc0000005 (STATUS_ACCESS_VIOLATION).
  • This update addresses an issue that affects the Tab Window Manager. It stops responding when you use IE mode.
  • This update addresses an issue that is related to changes in the forwarding of events.
  • This update addresses an issue that affects the Group Policy Service. It will not wait for 30 seconds, which is the default wait time, for the network to be available. Because of this, policies are not correctly processed.
  • This update adds a new API for D3D12 Independent Devices. You can use it to create multiple D3D12 devices on the same adapter. To learn more, see D3D12 Independent Devices.
  • This update addresses an issue that affects virtual machines (VM). Creating new VMs fails for Azure Stack Hub customers. This occurs when you add a new node to a cluster.
  • This update addresses an issue that affects certain VMs. Deploying them fails. This occurs because certain VM images do not respond to Address Resolution Protocol (ARP) requests if the source is outside of the local network.
  • This update addresses an issue that affects Azure Stack HCI customers. Your attempts to create VMs fail. This occurs when you delete and recreate server Representational State Transfer (REST) resources for the Network Controller.
  • This update addresses an issue that affects print jobs that are sent to a virtual print queue. They fail without an error.
  • This update affects Windows Defender Application Control (WDAC). Its policy to block software based on a hash might not stop the software from running.
  • This update affects unsigned WDAC policies. They are copied to the Extensible Firmware Interface (EFI) disk partition. It is reserved for signed policies.
  • This update addresses an issue that affects the Remote Desktop (RD) Web Role. If you enable that role, it fails when you upgrade RD deployments more than once.
  • This update addresses an issue that affects Narrator. Its focus does not change when the keyboard focus changes. Because of this, Narrator reads the wrong label within the dialog that appears when you sign in.
  • This update addresses an issue that affects the Microsoft Distributed Transaction Coordinator (DTC). It has a handle leak. Because of this, the system runs out of memory.
  • This update addresses an issue that affects the Resultant Set of Policy (RSOP). The Windows LAPS “BackupDirectory” policy setting was not being reported. This occurs when the setting is set to 1, which is “Back up to AAD.”
  • This update addresses an issue that affects authentication. Using a smart card to join or rejoin a computer to an Active Directory domain might fail. This occurs after you install Windows updates dated October 2022 or later. For more details, see KB5020276.
  • This update addresses an issue that affects DPM 2019 and DPM 2022. When you try to install them, it fails. This occurs because the Resilient File System (ReFS) stops responding.
  • This update turns on the Remote Desktop IP Virtualization feature. It simulates a single-user desktop. To do this, it supports per-session and per-program Remote Desktop IP Virtualization for Winsock applications. To learn more, see Remote Desktop IP Virtualization in Windows Server.
    If you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device.For more information about security vulnerabilities, please refer to the Security Update Guide and the September 2023 Security Updates.

Windows Server 2022 servicing stack update - 20348.1960

This update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.

Known issues in this update

Microsoft is not currently aware of any issues with this update.

How to get this update

Before installing this updateMicrosoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.Install this update****Release Channel Available Next Step
Windows Update and Microsoft Update Yes None. This update will be downloaded and installed automatically from Windows Update.
Windows Update for Business Yes None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies.
Microsoft Update Catalog Yes To get the standalone package for this update, go to the Microsoft Update Catalog website.
Windows Server Update Services (WSUS) Yes This update will automatically sync with WSUS if you configure Products and Classifications as follows:Product: Microsoft Server operating system-21H2Classification: Security Updates

If you want to remove the LCUTo remove the LCU after installing the combined SSU and LCU package, use the DISM/Remove-Package command line option with the LCU package name as the argument. You can find the package name by using this command:DISM /online /get-packages.Running Windows Update Standalone Installer (wusa.exe) with the**/uninstall **switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.

File InformationFor a list of the files that are provided in this update, download the file information for cumulative update 5030216. For a list of the files that are provided in the servicing stack update, download the file information for the SSU - version 20348.1960.

8.8 High

CVSS3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

5.8 Medium

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

77.1%