Lucene search

K
mskbMicrosoftKB5031356
HistoryOct 10, 2023 - 7:00 a.m.

October 10, 2023—KB5031356 (OS Builds 19044.3570 and 19045.3570)

2023-10-1007:00:00
Microsoft
support.microsoft.com
137
windows update
security issues
quality improvements
windows 10
version 22h2
version 21h2
cve-2023-44487
registry keys
http2maxclientresetsperminute
http2maxclientresetsgoaway
servicing stack update
known issues

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.732 High

EPSS

Percentile

98.1%

October 10, 2023—KB5031356 (OS Builds 19044.3570 and 19045.3570)

11/17/20For information about Windows update terminology, see the article about the types of Windows updates and the monthly quality update types. For an overview of Windows 10, version 21H2, see its update history page.**Note **Follow @WindowsUpdate to find out when new content is published to the Windows release health dashboard.

Highlights

  • This update addresses security issues for your Windows operating system.

Improvements

NoteTo view the list of addressed issues, click or tap the OS name to expand the collapsible section.

__

Windows 10, version 22H2

**Important:**Use EKB KB5015684 to update to Windows 10, version 22H2.

This security update includes quality improvements. Key changes include:

  • This build includes all the improvements from the supported Windows 10, version 21H2 editions.
  • No additional issues are documented for this release.

__

Windows 10, version 21H2 editions: Windows 10 Enterprise and Education, Windows 10 IoT Enterprise, and Windows 10 Enterprise multi-session

**Important:**Use EKB KB5003791 to update to Windows 10, version 21H2 on supported editions.

This security update includes quality improvements that were a part of update KB5030300 (released September 26, 2023). When you install this KB:

* To protect against CVE-2023-44487, you should install the latest Windows update. Based on your use case, you can also set the limit of the RST_STREAMS per minute using the new registry keys in this update. You can create the DWORD registry values in the table below under the following registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP\ParametersThese keys are not present by default when you install this KB. You can create them as required to set new values for your environment.Registry key Default value Valid value range Registry key function
Http2MaxClientResetsPerMinute 400 0–65535 Sets the allowed number of resets (RST_STREAMS) per minute for a connection. When you reach this limit, a GOAWAY message is sent to client for the connection.
Http2MaxClientResetsGoaway 1 0-1 Disables or enables the GOAWAY message to send when you reach the limit. If you set this to 0, the connection ends as soon as you reach the limit.
If you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device. For more information about security vulnerabilities, please refer to the new Security Update Guide website and the October 2023 Security Updates.

Windows 10 servicing stack update - 19044.3562 and 19045.3562

This update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.

Known issues in this update

Symptom Workaround
Using the FixedDrivesEncryptionType or SystemDrivesEncryptionType policy settings in the BitLocker configuration service provider (CSP) node in mobile device management (MDM) apps might incorrectly show a 65000 error in the “Require Device Encryption” setting for some devices in your environment. Affected environments are those with the “Enforce drive encryption type on operating system drives” or “Enforce drive encryption on fixed drives” policies set to enabled and selecting either “full encryption” or “used space only”. Microsoft Intune is affected by this issue but third-party MDMs might also pe affected. Important This issue is a reporting issue only and does not affect drive encryption or the reporting of other issues on the device, including other BitLocker issues. This issue is addressed in KB5034203.
This update might not be installed successfully. Devices might initially display progress, but then not finish the installation.A common error code encountered with this issue is Error 8007000D (ERROR_INVALID_DATA). This error can be found in Update History.To view your update history, selectStart>Settings>Windows Update>Update history. This issue is resolved by using Known Issue Rollback (KIR). Please realize that it might require up to 48 hours for the resolution to propagate automatically to consumer devices and unmanaged business devices.If necessary, use the following steps to resolve this issue:
  1. ​Run Command Prompt as Administrator.
  2. ​In the Command Prompt window, type the following command:
    Dism /online /cleanup-image /RestoreHealth
  3. ​Wait for the process to complete successfully, and then close the windows.
  4. Install this update. To do this, select Start >Settings>Windows Update>Check for updates.
    For enterprise-managed devices that have installed an affected update and encountered this issue, it can be resolved by installing and configuring a special Group Policy. The special Group Policy can be found in Computer Configuration >Administrative Templates><Group Policy name listed below>. For information on deploying and configuring these special Group Policy, please see How to use Group Policy to deploy a Known Issue Rollback.Group Policy downloads with Group Policy name:

How to get this update

Before installing this updateMicrosoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.Prerequisite:Based on your installation scenario, choose one of the following:

  1. For offline OS image servicing:If your image does not have the March 22, 2022 (KB5011543) or later LCU, you mustinstall the special standalone May 10, 2022 SSU (KB5014032) before installing this update.
  2. For Windows Server Update Services (WSUS) deployment or when installing the standalone package from Microsoft Update Catalog: If your devices do not have the May 11, 2021 (KB5003173) or later LCU, you mustinstall the special standalone August 10, 2021 SSU (KB5005260) before installing this update.
    Install this update****Release Channel|Available|Next Step
    —|—|—
    Windows Update and Microsoft Update| Yes| None. This update will be downloaded and installed automatically from Windows Update.
    Windows Update for Business| Yes| None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies.
    Microsoft Update Catalog| Yes| To get the standalone package for this update, go to the Microsoft Update Catalog website.
    Windows Server Update Services (WSUS)| Yes| This update will automatically sync with WSUS if you configure Products and Classifications as follows:Product: Windows 10, version 1903 and laterClassification: Security Updates

If you want to remove the LCUTo remove the LCU after installing the combined SSU and LCU package, use the DISM/Remove-Package command line option with the LCU package name as the argument. You can find the package name by using this command:DISM /online /get-packages.Running Windows Update Standalone Installer (wusa.exe) with the**/uninstall **switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.

File informationFor a list of the files that are provided in this update, download the file information for cumulative update 5031356.For a list of the files that are provided in the servicing stack update, download the file information for the SSU - versions 19044.3562 and 19045.3562.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.732 High

EPSS

Percentile

98.1%