Microsoft Windows Security Updates April 2023: What you need to know before installat
#1
Information 
Quote:[Image: computer-laptop-email-scaled.jpg]

It is the second Tuesday of April 2023, and that means that Microsoft has released security updates for Windows and other company products.
Security updates were released for Microsoft Windows, Office, Microsoft Edge and many other company products.

Our overview guides system administrators and home users. It lists the released updates and known issues, includes links to support articles and direct downloads, and provides information about other updates that Microsoft released on the April 2023 Patch Tuesday.

Click here to check out the March 2023 Microsoft Windows Patch Day overview in case you missed it.

Microsoft Windows Security Updates: April 2023You can download the following Excel spreadsheet. It lists the released security updates of the April 2023 Microsoft Patch Day. Click on the following link to download it:  Windows Security Updates April 2023

Executive Summary
  • Microsoft released security updates for all supported client and server versions of Windows.
  • Security updates were also released for .NET Core, Azure, Microsoft Office, Microsoft Defender for Endpoint, Microsoft Edge, Visual Studio and other company products.
  • The following Windows client version have known issues: Windows 10 version 20H2, 21H2 and 22H2, Windows 11 version 21H2 and 22H2
  • The following Windows server versions have known issues: Windows Server 2008, Windows Server 2008 R2, Windows Server 2019, Windows Server 2022
Operating System Distribution
  • Windows 10 version 21H2 and 22H2: 56 vulnerabilities, 5 critical and 51 important.
    • Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability -- CVE-2023-28250
    • Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2023-28232
    • Layer 2 Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2023-28220
    • Layer 2 Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2023-28219
    • Microsoft Message Queuing Remote Code Execution Vulnerability -- CVE-2023-21554
  • Windows 11 and Windows 11 version 22H2:  59 vulnerabilities, 5 critical and 54 important
    • same as Windows 10 version 22H2
Windows Server products
  • Windows Server 2008 R2 (extended support only): 43 vulnerabilities: 6 critical and 37 important
    • Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability -- CVE-2023-28250
    • Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2023-28232
    • DHCP Server Service Remote Code Execution Vulnerability -- CVE-2023-28231
    • Layer 2 Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2023-28220
    • Layer 2 Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2023-28219
    • Microsoft Message Queuing Remote Code Execution Vulnerability -- CVE-2023-21554
  • Windows Server 2012 R2: 62 vulnerabilities: 6 critical and 56 important
    • Same as Windows Server 2008 R2
  • Windows Server 2016: 66 vulnerabilities: 6 critical and 60 important.
    • Same as Windows Server 2008 R2
  • Windows Server 2019: 69 vulnerabilities: 6 critical and 63 important.
    • Same as Windows Server 2008 R2
  •  Windows Server 2022:  72 vulnerabilities: 6 critical and 66 important.
    • Same as Windows Server 2008 R2
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
QOwnNotes 19.1.6
24.12.4 The wel...Kool — 12:56
INTEL Arc Graphics 32.0.101.6325/6253 dr...
Highlights Fix...harlan4096 — 11:06
GFYI [Official] Revo Uninstaller Pro v5...
"Share feedback...damien76 — 09:01
GFYI [Official] SpyShelter PRO v15 Chri...
Merry Christmas and ...damien76 — 08:56
GFYI [Official] IObit Christmas 2024 Bl...
Merry Christmas and ...damien76 — 08:54

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
There are no staff members currently online.

>