KB5018410 Windows 10 cumulative updates for October 2022

This content has been archived. But, the content is true and relevant to the underlying technology products or infrastructure services.

The latest cumulative updates for Windows 10 were released on 10th October 2022. KB5018410, KB5018411, KB5018425, and KB5018419 are the latest updates for different builds of Windows 10. We review the cumulative update KB5018410 for Windows 10.

KB5018410 – Salient points about Windows 10 cumulative updates

  • KB5018410 has been superseded by KB5019959 for Windows 10 versions 20H2, 21H1, 21H2 and 22H2. You can read more about KB5019959 on this page.
  • KB5018410 is the latest cumulative update for Windows 10 versions 20H2, 21H1, and 21H2 for the month of October 2022.
  • KB5018410 supersedes KB5017308 cumulative update that was released in September 2022.
  • KB5018410 also contains all the changes that are part of the optional update for Windows 10 KB5017380. KB5017380 was released on September 20, 2022.
  • Zero-day threat CVE-2022-41033 affects Windows 10 and is resolved in KB5018410.
  • KB5018410 will boost the Windows 10 builds to OS Builds 19042.2130, 19043.2130, and 19044.2130 for 20H2, 21H1, and 21H2 versions respectively.
  • There are specific prerequisites in terms of Servicing Stack Updates for Windows 10 20H2, 21H1, and 21H2 versions.
  • You may run into issues with the legacy Edge installations on systems that have been patched with KB5018410. The browser may get uninstalled, yet the new version of Edge may not be installed automatically.
  • Some developers and system administrators have reported problems with TLS 1.2 handshakes. Microsoft has recognized the issue and released an out-of-band update KB5020435 to mitigate the TLS issues on the Windows 10 computers. You can read more about the out-of-band update KB5020435 in the section below
  • RDP connections from Windows 10 and Windows 11 are falling after the deployment of October month’s cumulative updates. A fix is awaited.
  • TLS 1 and TLS 1.1 has been blocked on Windows 10 systems. Microsoft has published a registry hive entry to unblock TLS 1 and TLS 1.1 for legacy applications.
  • The build on Windows 10 systems would change from OS Builds 19042.2130, 19043.2130, and 19044.2130 to OS Builds 19042.2132, 19043.2132, and 19044.2132.

KB5020435 Out of band update for Windows 10

KB5020435 has been released on 17th October 2022 to mitigate TLS issues. It appears that some developers have had problems getting TLS 1.2 connections to work properly. Microsoft released an OOB or emergency update to fix this issue on 17th October 2022.

Here is what Microsoft has mentioned about the problem description:

We address an issue that might affect some types of Secure Sockets Layer (SSL) and Transport Layer Security (TLS) connections. These connections might have handshake failures. For developers, the affected connections are likely to receive one or more records followed by a partial record with a size of less than 5 bytes within a single input buffer. If the connection fails, your app will receive the error, “SEC_E_ILLEGAL_MESSAGE”.

Source – Microsoft release notes

This OOB update is meant for Windows 10 versions 20H2, 21H1, and 21H2. Alternatively, you may say that this OOB update is applicable for Windows 10 version 1903 and later.

To get this OOB update KB5020435, you will need to download the MSU file from the Microsoft Update Catalog page for KB5020435.

Prerequisites for installing KB5018410 on Windows 10

For manual patching, KB5018410 can be installed if you have the cumulative update KB5011543 or the Servicing Stack Update KB5014032 on Windows 10 installations.

  • KB5011543 can be downloaded from this page on the Microsoft Update Catalog for KB5011543. The MSU file should be downloaded corresponding to the Windows 10 version and architecture in terms of x64 or ARM64 systems.
  • If you have not deployed KB5011543 or later cumulative updates, you can install the Servicing Stack Update KB5014032 on Windows 10. KB5014032 can be downloaded from this page on the Microsoft Update Catalog. The Servicing Stack Update is a small-sized file with sizes under 16 MB. No system reboot takes place after deploying the SSU.

If you have used WSUS for patch deployment, you will need one of the following updates as a prerequisite on Windows 10:

  • Cumulative update KB5003173 or later date cumulative update should have already been deployed on Windows 10. KB5003173 was released in May 2021. You can download the KB5003173 update file from the Microsoft Update Catalog page for KB5003173.
  • Alternatively, you can install the Servicing Stack Update KB5005260 on Windows 10 systems. KB5005260 can be downloaded from the Microsoft Update Catalog page for KB5005260.

Out of these two stated options, installing the Servicing Stack Update will be swifter as the size of the update file for each version of Windows 10 is less than 15 MB.

How to deploy KB5018410 on Windows 10?

Windows 10 patch KB5018410 can be automatically deployed through the following programs:

  • Windows Update
  • Windows Update for Business
  • WSUS or Windows Server Update Services

Vulnerabilities on Windows 10 under KB5018410

Windows 10 versions 20H2, 21H1, and 21H2 are affected by over 50 vulnerabilities. Our focus remains on the zero-day threat CVE-2022-41033 and the 9 ‘CRITICAL’ vulnerabilities that are found on most Windows 10 installations.

CVE-2022-41033 – Windows COM+ Event System Service Elevation of Privilege Vulnerability

This is a CVSS 7.8 vulnerability with an ‘IMPORTANT’ severity rating that affects Windows 10 computers.

This is an ‘Elevation of Privileges’ vulnerability and an attacker could assume system privileges upon a successful attack. CVE-2022-41033 is already being exploited and is considered a zero-day threat.

Aside from the zero-day threat shared above, there are 9 ‘CRITICAL’ vulnerabilities on Windows 10 computers. Out of these 9 vulnerabilities:

  • 7 Remote Code Execution threats
  • 1 Elevation of Privileges threat
  • 1 Spoofing threat

The details of 9 vulnerabilities with a ‘CRITICAL’ impact on Windows 10 are shared in the quick reference summary table.

VulnerabilityCVSS RatingComments
CVE-2022-220358.1Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2022-301988.1Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2022-346897.5Windows CryptoAPI Spoofing Vulnerability
CVE-2022-379767.8Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2022-336348.1Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2022-245048.1Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2022-410818.1Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2022-380008.1Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2022-380478.1Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability

You may like to read more about Windows updates below:

How useful was this post?

Click on a star to rate it!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Rajesh Dhawan

Rajesh Dhawan is a technology professional who loves to blog about smart wearables, Cloud computing and Microsoft technologies. He loves to break complex problems into manageable chunks of meaningful information.