July 1, 2022


the blog news

Take your time testing these February Patch Tuesday updates

There are (as of now) 51 patches to the Home windows ecosystem for February, however no crucial updates and no “Patch Now” suggestions from the Readiness group. I am hoping that with this month’s checklist of Patch Tuesday updates, we are able to benefit from the quiet after the storm. January was robust for lots of oldsters. And, with this month’s very mild launch from Microsoft, company safety and techniques directors can take the time wanted to check their functions and desktop/server builds. It is also essential to put money into their testing methodologies, launch practices, and the way their functions could also be affected by OS-level updates and patches.

Yow will discover extra data on the chance of deploying these Patch Tuesday updates utilizing our detailed infographic.

Key testing eventualities

There aren’t any reported high-risk adjustments to Home windows this month. Nevertheless, there’s one reported purposeful change, and a further characteristic added:

  • Printing: Carry out all primary print operations with a number of kinds of printers. Carry out print operations with varied third-party apps. Most significantly, check your print spooler providers on any shared service servers (e.g., Area Controllers).
  • VPN: Validate VPN connectivity utilizing present/new VPN connections (Create/Join/Take away).
  • Kernel Updates: Any functions that depend on DirectComposition ought to work as meant.
  • CFS Logs Take a look at out Create/Learn/Replace/Lengthen/Trim.

When testing your printing providers, guarantee that you’re validating your spooler and SHD (shadow information). Testing these service artifacts is very essential in case you make use of symbolic or laborious hyperlinks to entry these jobs.

Identified points

Every month, Microsoft features a checklist of recognized points that relate to the working system and platforms included on this replace cycle. There’s greater than typical, so I’ve referenced a couple of key points that relate to the newest builds from Microsoft together with:

  • Gadgets with Home windows installations created from customized offline media or customized ISO picture may need Microsoft Edge Legacy eliminated by this replace, however not robotically changed by the brand new Microsoft Edge. To keep away from this challenge, remember to first slipstream the SSU launched March 29, 2021 or later into the customized offline media or ISO picture earlier than slipstreaming the LCU.
  • After putting in KB4493509, units with some Asian language packs put in could obtain the error, “0x800f0982 – PSFX_E_MATCHING_COMPONENT_NOT_FOUND.” To resolve this challenge, Microsoft recommends that you just “uninstall and reinstall any just lately added language packs.” For directions, see Handle the enter and show language settings in Home windows 10.
  • After putting in this replace, when connecting to units in an untrusted area utilizing Distant Desktop, connections may fail to authenticate when utilizing good card authentication. You may obtain the immediate “Your credentials didn’t work. The credentials that had been used to connect with [device name] didn’t work. Microsoft has printed a Identified Problem Roll-back for this downside. For additional directions, see The best way to use Group Coverage to deploy a Identified Problem Rollback.
See also  Microsoft to kill Patch Tuesday for some enterprise customers

After putting in updates launched Jan. 11 or later, functions that use the Microsoft .NET Framework to accumulate or set Energetic Listing Forest Belief Info may need points. The apps may fail or shut, otherwise you may obtain an error from the app or Home windows. You may additionally obtain an entry violation (0xc0000005) error. To resolve this challenge manually, apply the out-of-band updates for the model of the .NET Framework utilized by the app. We suggest that you just scan your inside line of enterprise functions for any dependencies on System.DirectoryServices API.

Main revisions

Although there’s a a lot smaller checklist of patches this month, Microsoft launched a number of revisions to earlier patches, together with:

  • CVE-2019-0887: That is an previous patch that has been reported as publicly exploited. In consequence, Microsoft has added the Distant Desktop consumer to the affected platforms checklist. To make sure compliance, ensure you have model 1.2.2691 of the distant desktop consumer put in.
  • CVE-2021-34500: That is an uncommon revision, as Microsoft has expanded the checklist of affected techniques to incorporate earlier variations of Home windows 10, Home windows 7, and Server 2012. It often works the opposite means. In case you are utilizing previous(er) variations of Home windows, you could have to reference the Microsoft Information base article KB4497181 to make sure that you have got the suitable ESU MAK add-on key. This key shall be required to acquire this newest patch for these legacy techniques.
  • CVE-2022-21871: This patch revision solely impacts customers of Visible Studio 2019 16.7 and 16.9. It is purely informational; no motion is required.
  • CVE-2022-23254: That is an data change to this patch’s title. No additional motion crucial.
See also  Google Workspace rolls out updates to Meet, Chat and Voice

Mitigations and workarounds

This month Microsoft has printed two mitigating components, together with:

  • CVE-2022-21984: Microsoft has printed a really temporary mitigating issue for this DNS associated safety challenge, noting that, “to be weak your DNS server must have dynamic updates enabled”. I hope that this helps.
  • CVE-2022-21907: Microsoft has suggested that this HTTP stack stage zero-day challenge doesn’t apply to Server 2019 except you have got enabled the next registry setting: HKEY_LOCAL_MACHINESystemCurrentControlSetServicesHTTPParameters. This mitigation solely applies to Home windows Server 2019 and Home windows 10, model 1809 and doesn’t apply to Home windows 10, model 20H2 and newer. So, in case you are on later desktop and server platforms, it’s essential to apply this patch as quickly as doable.

Every month, we break down the replace cycle into product households (as outlined by Microsoft) with the next primary groupings:

  • Browsers (Microsoft IE and Edge);
  • Microsoft Home windows (each desktop and server);
  • Microsoft Workplace;
  • Microsoft Alternate;
  • Microsoft Growth platforms ( ASP.NET Core, .NET Core and Chakra Core);
  • Adobe (retired???, possibly subsequent yr).


There are a complete of twenty-two (+1) updates to the Microsoft Edge (Chromium) browser this month. None are crucial, with one patch rated average and the remaining rated essential. Unusually, there was a further replace for Microsoft Edge posted yesterday (CVE-2022-23246) that was included as a part of an up to date launch be aware for Microsoft Edge safety replace discovered right here. Add these Chrome (Edge and Chromium) updates to your common replace launch schedule.

Home windows

We had been hoping for a quieter replace this month and Microsoft actually delivered — with no crucial updates for Home windows or Microsoft Workplace. Provided that January’s launch was giant and sophisticated, a number of issues had been encountered, together with:

To treatment these and different reported (minor) points, a uncommon Out-of-Band (OOB) replace was launched on Jan 17. Microsoft has posted 26 patches this month, masking Hyper-V, printing, error/logging sub-systems, networking, and video codecs. Given the testing necessities for all these adjustments to the core working system, we recommend a staged strategy and including these Home windows updates to your normal replace launch schedule.

See also  Not all patching issues are created equal

Microsoft Workplace

This month’s patches for Microsoft Workplace will set up on the next baselines:

  • Workplace 2010, 2103, 2016 (consumer and server);
  • SharePoint 2013 and 2106 (server).

Although Microsoft has printed 11 updates (all rated essential) for this launch, solely eight apply to Home windows techniques. Microsoft has shared some primary testing pointers for the updates, together with:

  • Confirm Excel file/open eventualities for untrusted XLS information;
  • Concentrate on testing legacy content material: ActiveX Controls, Footage, Shapes, SmartArt, Charts, WordArt;
  • SharePoint (on-premises): check creating a brand new Media web-part.

Microsoft additionally printed a significant recognized challenge with this month’s Workplace replace, saying: “The Machine Translation service fails if the content material incorporates sure HTML tags.” To work round this challenge, see Publishing pages can’t be translated in SharePoint Server 2019 (KB5011291). All of the native workplace installations (excluding click-to-run virtualized situations) require person interactions and don’t considerably degrade the system if affected. These patches signify a low threat and have been documented to have an effect on core performance (probably affecting dependent line-of-business functions). Add these updates to your normal Workplace replace schedule.

Microsoft Alternate Server

Following the pattern of a really mild patch cycle, Microsoft has not launched any updates for the Alternate Server platform. 

Microsoft growth platforms

Issues are positively mild on the bottom this month, however we do have a couple of very minor updates for Microsoft growth instruments, together with two patches to Visible Studio (CVE-2022-21986 and CVE-2022-21991) Each of those minor updates are rated essential by Microsoft and ought to be (nearly casually) added to your normal growth patch schedule.

Adobe (actually simply Reader)

Adobe launched a number of safety updates this month, however fortunately nothing for Adobe Reader. Yow will discover Adobe’s February launch notes right here; it pertains to Adobe Premier, Illustrator, Photoshop, After Results, and Artistic Cloud Desktop. Let’s have a look at what Adobe has in retailer for us in March.

Copyright © 2022 Aghnai, Inc.