cancel
Showing results for 
Search instead for 
Did you mean: 
Freddie_Jimenez
Content Contributor
Content Contributor

The following is a summary of Microsoft's Security Bulletin Guide for August, 2024. Hyland has downloaded these patches and applied them to our R&D Infrastructure. We will be performing SCR, automated, and regression testing in environments containing these patches over the next month. If no issues have been found or reported, we will deem testing to be complete.

 

The testing is not all-inclusive; issues may still be found upon implementation. Follow best practices for testing and installing software updates/patches in a development environment before implementing the updates in a production environment. Where applicable, the updates are tested on all supported Windows platforms with the latest OnBase® version.

 

August 2024 Security Updates

This release consists of the following 90 Microsoft CVEs:

Tag

CVE

Base Score

CVSS Vector

Exploitability

FAQs?

Workarounds?

Mitigations?

Windows Secure Kernel Mode

CVE-2024-21302

6.7

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C

Exploitation Less Likely

Yes

No

No

Windows Kerberos

CVE-2024-29995

8.1

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Windows DNS

CVE-2024-37968

7.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C

Exploitation Less Likely

No

No

No

Windows TCP/IP

CVE-2024-38063

9.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation More Likely

Yes

No

Yes

Microsoft Office

CVE-2024-38084

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Azure Connected Machine Agent

CVE-2024-38098

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Unlikely

Yes

No

No

Windows Kernel

CVE-2024-38106

7.0

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

Exploitation Detected

Yes

No

No

Windows Power Dependency Coordinator

CVE-2024-38107

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

Exploitation Detected

Yes

No

No

Azure Stack

CVE-2024-38108

9.3

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Azure Health Bot

CVE-2024-38109

9.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows IP Routing Management Snapin

CVE-2024-38114

8.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows IP Routing Management Snapin

CVE-2024-38115

8.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows IP Routing Management Snapin

CVE-2024-38116

8.8

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows NTFS

CVE-2024-38117

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Local Security Authority Server (lsasrv)

CVE-2024-38118

5.5

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Routing and Remote Access Service (RRAS)

CVE-2024-38120

8.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Routing and Remote Access Service (RRAS)

CVE-2024-38121

8.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Local Security Authority Server (lsasrv)

CVE-2024-38122

5.5

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Bluetooth Driver

CVE-2024-38123

4.4

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Streaming Service

CVE-2024-38125

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation More Likely

Yes

No

No

Windows Network Address Translation (NAT)

CVE-2024-38126

7.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Kernel

CVE-2024-38127

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Routing and Remote Access Service (RRAS)

CVE-2024-38128

8.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Routing and Remote Access Service (RRAS)

CVE-2024-38130

8.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Clipboard Virtual Channel Extension

CVE-2024-38131

8.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Network Address Translation (NAT)

CVE-2024-38132

7.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Kernel

CVE-2024-38133

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation More Likely

Yes

No

No

Microsoft Streaming Service

CVE-2024-38134

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows NT OS Kernel

CVE-2024-38135

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Resource Manager

CVE-2024-38136

7.0

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Resource Manager

CVE-2024-38137

7.0

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Deployment Services

CVE-2024-38138

7.5

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Reliable Multicast Transport Driver (RMCAST)

CVE-2024-38140

9.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

Yes

Windows Ancillary Function Driver for WinSock

CVE-2024-38141

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation More Likely

Yes

No

No

Windows Secure Kernel Mode

CVE-2024-38142

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows WLAN Auto Config Service

CVE-2024-38143

4.2

CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Streaming Service

CVE-2024-38144

8.8

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation More Likely

Yes

No

No

Windows Layer-2 Bridge Network Driver

CVE-2024-38145

7.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Layer-2 Bridge Network Driver

CVE-2024-38146

7.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows DWM Core Library

CVE-2024-38147

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation More Likely

Yes

No

No

Windows Transport Security Layer (TLS)

CVE-2024-38148

7.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

Exploitation More Likely

Yes

No

No

Windows DWM Core Library

CVE-2024-38150

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation More Likely

Yes

No

No

Windows Kernel

CVE-2024-38151

5.5

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft WDAC OLE DB provider for SQL

CVE-2024-38152

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Kernel

CVE-2024-38153

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Routing and Remote Access Service (RRAS)

CVE-2024-38154

8.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Security Center

CVE-2024-38155

5.5

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Azure IoT SDK

CVE-2024-38157

7.0

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Azure IoT SDK

CVE-2024-38158

7.0

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Network Virtualization

CVE-2024-38159

9.1

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

Yes

Windows Network Virtualization

CVE-2024-38160

9.1

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

Yes

Windows Mobile Broadband

CVE-2024-38161

6.8

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Azure Connected Machine Agent

CVE-2024-38162

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Update Stack

CVE-2024-38163

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation More Likely

Yes

No

No

Windows Compressed Folder

CVE-2024-38165

6.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Dynamics

CVE-2024-38166

8.2

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

.NET and Visual Studio

CVE-2024-38167

6.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

.NET and Visual Studio

CVE-2024-38168

7.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

No

No

No

Microsoft Office Visio

CVE-2024-38169

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Office Excel

CVE-2024-38170

7.1

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Office PowerPoint

CVE-2024-38171

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Office Excel

CVE-2024-38172

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Office Outlook

CVE-2024-38173

6.7

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows App Installer

CVE-2024-38177

7.8

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Scripting

CVE-2024-38178

7.5

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

Exploitation Detected

Yes

No

No

Windows SmartScreen

CVE-2024-38180

8.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Kernel-Mode Drivers

CVE-2024-38184

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Kernel-Mode Drivers

CVE-2024-38185

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Kernel-Mode Drivers

CVE-2024-38186

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Kernel-Mode Drivers

CVE-2024-38187

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Office Project

CVE-2024-38189

8.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

Exploitation Detected

Yes

No

Yes

Windows Kernel-Mode Drivers

CVE-2024-38191

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Ancillary Function Driver for WinSock

CVE-2024-38193

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

Exploitation Detected

Yes

No

No

Azure CycleCloud

CVE-2024-38195

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Common Log File System Driver

CVE-2024-38196

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation More Likely

Yes

No

No

Microsoft Teams

CVE-2024-38197

6.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Print Spooler Components

CVE-2024-38198

7.5

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation More Likely

Yes

No

No

Line Printer Daemon Service (LPD)

CVE-2024-38199

9.8

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

Yes

Microsoft Office

CVE-2024-38200

6.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

Yes

Azure Stack

CVE-2024-38201

7.0

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Update Stack

CVE-2024-38202

7.3

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Copilot Studio

CVE-2024-38206

8.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Dynamics

CVE-2024-38211

8.2

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Mark of the Web (MOTW)

CVE-2024-38213

6.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C

Exploitation Detected

Yes

No

No

Windows Routing and Remote Access Service (RRAS)

CVE-2024-38214

6.5

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Cloud Files Mini Filter Driver

CVE-2024-38215

7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Edge (Chromium-based)

CVE-2024-38218

8.4

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Microsoft Edge (Chromium-based)

CVE-2024-38219

6.5

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

Windows Initial Machine Configuration

CVE-2024-38223

6.8

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Exploitation Less Likely

Yes

No

No

We are republishing 12 non-Microsoft CVEs:

CNA

Tag

CVE

FAQs?

Workarounds?

Mitigations?

Red Hat, Inc.

Windows Secure Boot

CVE-2022-2601

Yes

No

No

Red Hat, Inc.

Windows Secure Boot

CVE-2022-3775

Yes

No

No

Red Hat, Inc.

Windows Secure Boot

CVE-2023-40547

Yes

No

No

Chrome

Microsoft Edge (Chromium-based)

CVE-2024-6990

Yes

No

No

Chrome

Microsoft Edge (Chromium-based)

CVE-2024-7255

Yes

No

No

Chrome

Microsoft Edge (Chromium-based)

CVE-2024-7256

Yes

No

No

Chrome

Microsoft Edge (Chromium-based)

CVE-2024-7532

Yes

No

No

Chrome

Microsoft Edge (Chromium-based)

CVE-2024-7533

Yes

No

No

Chrome

Microsoft Edge (Chromium-based)

CVE-2024-7534

Yes

No

No

Chrome

Microsoft Edge (Chromium-based)

CVE-2024-7535

Yes

No

No

Chrome

Microsoft Edge (Chromium-based)

CVE-2024-7536

Yes

No

No

Chrome

Microsoft Edge (Chromium-based)

CVE-2024-7550

Yes

No

No

Security Update Guide Blog Posts

Date

Blog Post

June 27, 2024

Toward greater transparency: Unveiling Cloud Service CVEs

April 9, 2024

Toward greater transparency: Security Update Guide now shares CWEs for CVEs

January 6, 2023

Publishing CBL-Mariner CVEs on the Security Update Guide CVRF API

January 11, 2022

Coming Soon: New Security Update Guide Notification System

February 9, 2021

Continuing to Listen: Good News about the Security Update Guide API

January 13, 2021

Security Update Guide Supports CVEs Assigned by Industry Partners

December 8, 2020

Security Update Guide: Let’s keep the conversation going

November 9, 2020

Vulnerability Descriptions in the New Version of the Security Update Guide

Relevant Resources

  • The new Hotpatching feature is now generally available. Please see Hotpatching feature for Windows Server Azure Edition virtual machines (VMs) for more information.
  • Windows 10 and Windows 11 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10 and Windows 11, in addition to non-security updates. The updates are available via the Microsoft Update Catalog. For information on lifecycle and support dates for Windows 10 and Windows 11 operating systems, please see Windows Lifecycle Facts Sheet.
  • Microsoft is improving Windows Release Notes. For more information, please see What's next for Windows release notes.
  • A list of the latest servicing stack updates for each operating system can be found in ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.
  • In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.
  • Customers running Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See 4522133 for more information.

Known Issues reported by Microsoft

You can see these in more detail from the Deployments tab by selecting Known Issues column in the Edit Columns panel.

For more information about Windows Known Issues, please see Windows message center (links to currently-supported versions of Windows are in the left pane).

KB Article

Applies To

5041160

Windows Server 2022

5041571

Windows 11 version 24H2

5041578

Windows 10, version 1809, Windows Server 2019

5041580

Windows 10, version 21H2, Windows 10, version 22H2

5041592

Windows 11, version 21H2

5041773

Windows 10, version 1607, Windows Server 2016

5041828

Windows Server 2012 R2 (Monthly Rollup)

5041847

Windows Server 2008 (Security-only update)

5041850

Windows Server 2008 (Monthly Rollup)

5041851

Windows Server 2012 (Monthly Rollup)

 

Hyland Software - Microsoft Updates Statement

Hyland Software is dedicated to ensuring the monthly cumulative updates released by Microsoft® are compatible with OnBase®. On the second Tuesday of each month, the Quality Assurance Department of Hyland Software evaluates the cumulative fixes released and labeled as Critical or Important by Microsoft®. The details of the update provided by Microsoft are reviewed for interaction with OnBase® and installed when appropriate for testing its compatibility with OnBase®.