** 2 Weeks After Patch Tuesday **
Take advantage of this month’s relatively benign updates!
Server 2016’s update seems to be the problem child this month, though, but not catastrophically so, thankfully – This month’s updates seem to be relatively safe barring some oddities described below:
Windows 11
Windows 10
Server 2016
- Certificate-based VPN authentication
- Unable to install or remove MSIs
- Applications dependent on Visual C++ 2017 libraries crashing
** 72 Hours After Patch Tuesday **
Uhhh… no real issues this month (1, 2, 3, 4)?
Just some failure to install on Server 2016 virtual machines, an oddity for older PowerEdge servers in reboot loop running Server 2019, and old intel WiFi drivers acting up on Windows 10 22H2.
No disruptions detected or reported on the trackd platform.
Windows Server 2019
Windows 11 23H2
Windows 10 22H2
~It’s here~ September’s Patch Tuesday!
This month it addresses 79 vulnerabilities, 2 Criticals, 4 Zero Days (1 with Functional exploit code maturity).
Zero Days:
- CVE-2024-38014 – Windows Installer Elevation of Privilege Vulnerability
- CVE-2024-38217 – Windows Mark of the Web Security Feature Bypass Vulnerability (Functional exploit code)
- CVE-2024-38226 – Microsoft Publisher Security Features Bypass Vulnerability
- CVE-2024-43491 – Microsoft Windows Update Remote Code Execution Vulnerability
Check out all of the details surrounding Microsoft’s September updates on their Release Notes page