KB5016622

KB5016622 – Window Versions

Even even though Microsoft’s Identity focus actions closer to the cloud, they are not forgetting their on-premises roots. Windows Server 2016, Windows Server 2019 and Windows Server 2022 nonetheless acquire updates of KB5016622.

 

This is the listing of Identity-associated updates and fixes we noticed for August 2022:

 

Windows Server 2016

We found the following replace for Windows Server 2016:

 

KB5016622 AUGUST nine, 2022

The August nine, 2022 replace for Windows Server 2016 (KB5016622) updating the OS construct range to 14393.5291, is a month-to-month cumulative replace that includes the subsequent Identity-associated improvements:

 

It addresses an issue that prevents the Key Distribution Center (KDC) Proxy from nicely receiving Kerberos tickets for Windows Hello for Business authentications in Hybrid Key Trust implementations.

It addresses an difficulty that reasons the KDC code on Domain Controllers to incorrectly go back the subsequent errors message at some stage in shutdown:

KDC_ERR_TGT_REVOKED

 

It addresses an trouble that would cause the Local Security Authority Server Service (lsass.Exe) to leak tokens. This difficulty influences gadgets that have established Windows updates dated June 14, 2022 and later. This trouble occurs whilst the device plays a particular shape of carrier for consumer (S4U) in a non-Trusted Computing Base (TCB) Windows provider that runs as Network Service.

It enforces a hardening exchange that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of RFC 4556. If they do not comply, domain controllers will not authenticate them.

 

Windows Server 2019

We determined the following updates for Windows Server 2019:

 

KB5016622 AUGUST 9, 2022

The August nine, 2022 replace for Windows Server 2019 (KB5016623) updating the OS construct range to 17763.3287 is a month-to-month cumulative replace that includes the following Identity-associated enhancements:

 

It offers the choice to configure an trade login ID for the Azure Multi-Factor Authentication (MFA) Active Directory Federation Services (AD FS) adapter for on-premises scenarios. By default, the adapter configuration will not forget about exchange login ID (IgnoreAlternateLoginId = $fake) except explicitly set to $actual.

It addresses an trouble that would reason the Local Security Authority Server Service (lsass.Exe) to leak tokens. This trouble impacts gadgets that have set up Windows updates dated June 14, 2022 and later. This issue occurs whilst the tool performs a selected shape of provider for consumer (S4U) in a non-Trusted Computing Base (TCB) Windows provider that runs as Network Service.

It enforces a difficult change that requires printers and scanners that use smart cards for authentication to have firmware that complies with section 3.2.1 of RFC 4556. If they do no longer comply, domain controllers will now not authenticate them.

 

Windows 10 Version 1607 (x64) Patch Details

 

Patch Name

Windows10.0-kb5016622-x64-1607.Msu

Patch Description

2022-08 Cumulative Update for Windows 10 Version 1607 for x64-based Systems (KB5016622) (CVE-2022-34713)

Bulletin Id

MS22-AUG3

Bulletin Title

Cumulative Security Update for Microsoft Edge (KB5016623)

Severity

Critical

Location Path

Windows10.Zero-kb5016622-x64-1607.Msu

Bulletin Summary

The Microsoft Security Response Center (MSRC) investigates all reviews of safety vulnerabilities affecting Microsoft products and services, and presents the records here as a part of the ongoing effort that will help you manage security risks and help maintain your structures covered.

  • Superceding Bulletin Id
  • MS22-SEP3
  • Patch Release Date
  • Aug 9, 2022

 

Also Read: loranocarter+nevada

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *