The latest cumulative updates for Windows 10 were released on 10th October 2022. KB5018410, KB5018411, KB5018425, and KB5018419 are the latest updates for different builds of Windows 10. We review the cumulative update KB5018410 for Windows 10.
KB5018410 – Salient points about Windows 10 cumulative updates
- KB5018410 has been superseded by KB5019959 for Windows 10 versions 20H2, 21H1, 21H2 and 22H2. You can read more about KB5019959 on this page.
- KB5018410 is the latest cumulative update for Windows 10 versions 20H2, 21H1, and 21H2 for the month of October 2022.
- KB5018410 supersedes KB5017308 cumulative update that was released in September 2022.
- KB5018410 also contains all the changes that are part of the optional update for Windows 10 KB5017380. KB5017380 was released on September 20, 2022.
- Zero-day threat CVE-2022-41033 affects Windows 10 and is resolved in KB5018410.
- KB5018410 will boost the Windows 10 builds to OS Builds 19042.2130, 19043.2130, and 19044.2130 for 20H2, 21H1, and 21H2 versions respectively.
- There are specific prerequisites in terms of Servicing Stack Updates for Windows 10 20H2, 21H1, and 21H2 versions.
- You may run into issues with the legacy Edge installations on systems that have been patched with KB5018410. The browser may get uninstalled, yet the new version of Edge may not be installed automatically.
- Some developers and system administrators have reported problems with TLS 1.2 handshakes. Microsoft has recognized the issue and released an out-of-band update KB5020435 to mitigate the TLS issues on the Windows 10 computers. You can read more about the out-of-band update KB5020435 in the section below
- RDP connections from Windows 10 and Windows 11 are falling after the deployment of October month’s cumulative updates. A fix is awaited.
- TLS 1 and TLS 1.1 has been blocked on Windows 10 systems. Microsoft has published a registry hive entry to unblock TLS 1 and TLS 1.1 for legacy applications.
- The build on Windows 10 systems would change from OS Builds 19042.2130, 19043.2130, and 19044.2130 to OS Builds 19042.2132, 19043.2132, and 19044.2132.
KB5020435 Out of band update for Windows 10
KB5020435 has been released on 17th October 2022 to mitigate TLS issues. It appears that some developers have had problems getting TLS 1.2 connections to work properly. Microsoft released an OOB or emergency update to fix this issue on 17th October 2022.
Here is what Microsoft has mentioned about the problem description:
We address an issue that might affect some types of Secure Sockets Layer (SSL) and Transport Layer Security (TLS) connections. These connections might have handshake failures. For developers, the affected connections are likely to receive one or more records followed by a partial record with a size of less than 5 bytes within a single input buffer. If the connection fails, your app will receive the error, “SEC_E_ILLEGAL_MESSAGE”.Source – Microsoft release notes
This OOB update is meant for Windows 10 versions 20H2, 21H1, and 21H2. Alternatively, you may say that this OOB update is applicable for Windows 10 version 1903 and later.
To get this OOB update KB5020435, you will need to download the MSU file from the Microsoft Update Catalog page for KB5020435.
Prerequisites for installing KB5018410 on Windows 10
For manual patching, KB5018410 can be installed if you have the cumulative update KB5011543 or the Servicing Stack Update KB5014032 on Windows 10 installations.
- KB5011543 can be downloaded from this page on the Microsoft Update Catalog for KB5011543. The MSU file should be downloaded corresponding to the Windows 10 version and architecture in terms of x64 or ARM64 systems.
- If you have not deployed KB5011543 or later cumulative updates, you can install the Servicing Stack Update KB5014032 on Windows 10. KB5014032 can be downloaded from this page on the Microsoft Update Catalog. The Servicing Stack Update is a small-sized file with sizes under 16 MB. No system reboot takes place after deploying the SSU.
If you have used WSUS for patch deployment, you will need one of the following updates as a prerequisite on Windows 10:
- Cumulative update KB5003173 or later date cumulative update should have already been deployed on Windows 10. KB5003173 was released in May 2021. You can download the KB5003173 update file from the Microsoft Update Catalog page for KB5003173.
- Alternatively, you can install the Servicing Stack Update KB5005260 on Windows 10 systems. KB5005260 can be downloaded from the Microsoft Update Catalog page for KB5005260.
Out of these two stated options, installing the Servicing Stack Update will be swifter as the size of the update file for each version of Windows 10 is less than 15 MB.
How to deploy KB5018410 on Windows 10?
Windows 10 patch KB5018410 can be automatically deployed through the following programs:
- Windows Update
- Windows Update for Business
- WSUS or Windows Server Update Services
Vulnerabilities on Windows 10 under KB5018410
Windows 10 versions 20H2, 21H1, and 21H2 are affected by over 50 vulnerabilities. Our focus remains on the zero-day threat CVE-2022-41033 and the 9 ‘CRITICAL’ vulnerabilities that are found on most Windows 10 installations.
CVE-2022-41033 – Windows COM+ Event System Service Elevation of Privilege Vulnerability
This is a CVSS 7.8 vulnerability with an ‘IMPORTANT’ severity rating that affects Windows 10 computers.
This is an ‘Elevation of Privileges’ vulnerability and an attacker could assume system privileges upon a successful attack. CVE-2022-41033 is already being exploited and is considered a zero-day threat.
Aside from the zero-day threat shared above, there are 9 ‘CRITICAL’ vulnerabilities on Windows 10 computers. Out of these 9 vulnerabilities:
- 7 Remote Code Execution threats
- 1 Elevation of Privileges threat
- 1 Spoofing threat
The details of 9 vulnerabilities with a ‘CRITICAL’ impact on Windows 10 are shared in the quick reference summary table.
|CVE-2022-22035||8.1||Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability|
|CVE-2022-30198||8.1||Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability|
|CVE-2022-34689||7.5||Windows CryptoAPI Spoofing Vulnerability|
|CVE-2022-37976||7.8||Windows Common Log File System Driver Elevation of Privilege Vulnerability|
|CVE-2022-33634||8.1||Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability|
|CVE-2022-24504||8.1||Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability|
|CVE-2022-41081||8.1||Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability|
|CVE-2022-38000||8.1||Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability|
|CVE-2022-38047||8.1||Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability|
You may like to read more about Windows updates below:
- KB5018418 latest cumulative update for Windows 11
- KB5018476 Security Update for Windows Server 2012 R2
- KB5018478 Security update for Windows Server 2012
- KB5018421 Cumulative update for Windows Server 2022
- KB5018411 latest cumulative update for Windows Server 2016
- KB5018419 latest cumulative update for Windows Server 2019
- KB5017328 Cumulative Update for Windows 11
We are sorry that this post was not useful for you!
Let us improve this post!
Tell us how we can improve this post?
Rajesh Dhawan is a technology professional who loves to blog about smart wearables, Cloud computing and Microsoft technologies. He loves to break complex problems into manageable chunks of meaningful information.