KB5030214 is the cumulative update for Windows Server 2019. It was released on 12th September 2023 as part of the ‘Patch Tuesday’ project of Microsoft.
We look at some important details of KB5030214 below.
Salient points
- KB5030214 supersedes KB5029247 cumulative update. KB5029247 was released on 8th August 2023. You can read more about KB5029247 on this page.
- KB5030214 corresponds to the server build 17763.4851. When you upgrade from KB5029247 to KB5030214, you will upgrade from server build 17763.4773 to 17763.4851.
- Prior to installing KB5030214, you need to ensure that the Servicing Stack Update KB5005112 is already deployed on the Windows Server 2019 and Windows Server 2019 Server Core installation.
- KB5005112 is an old Servicing Stack Update and was released in August 2021. There is a high likelihood that KB5005112 is already patched on the server.
- 18 security vulnerabilities have been disclosed for Windows Server 2019 as part of September month’s security bulletin. All these vulnerabilities have ‘IMPORTANT’ severity level.
- Zero-day threat CVE-2023-36802 affects Windows Server 2019. It is a CVSS 7.8 vulnerability that is an Elevation of Privilege Vulnerability affecting Microsoft Streaming Service Proxy.
- One of the most important fixes in KB5030214 is the issue involving Windows Update for Business. After you are asked to change your password at sign in, the change operation fails. Then you cannot sign in. The error code is 0xc000006d.
Download KB5030214
KB5030214 can be automatically deployed on Windows Server 2019 using one of the following methods:
- Windows Update
- Windows Update for Business
- WSUS or Windows Server Update Service
WSUS or Windows Server Update Service remains the most preferred method for rolling out updates to Windows Server 2019.
For manual deployments, you can download the offline installer file for Windows Server 2019. The offline installer file can be downloaded from the Microsoft Update Catalog site. We have shared the links for Microsoft Update Catalog and the direct download links for KB5030214 below.
The size of the offline installer file for KB5030214 is 612.6 MB.
Servicing Stack Update KB5005112 is also required as a pre-requisite. So, let us share the download links for KB5005112 below.
The size of the Servicing Stack Update is 13.8 MB.
When you install any Servicing Stack Update, the server will not restart. However, when you install the cumulative update, the server will reboot. Therefore, we strongly suggest installing the cumulative updates as part of an organized change management process.
Vulnerabilities
18 security vulnerabilities have been covered in September month’s security bulletin for Windows Server 2019. None of these have a ‘CRITICAL’ severity level.
However, we want to focus on one vulnerability that has already been exploited. The details of the zero-day threat affecting Windows Server 2019 and Windows Server 2019 Server Core installation are shared below.
- CVE-2023-36802
- The vulnerability has a CVSS score of 7.8.
- This vulnerability affects Microsoft Streaming Service Proxy.
- It is an Elevation of Privilege vulnerability in which an attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
KB5030214 Changelog
The following changes or improvements are part of the KB5030214 cumulative update for Windows Server 2019:
- This update supports daylight saving time (DST) changes in Israel.
- This update addresses an issue that affects the Microsoft Distributed Transaction Coordinator (DTC). It has a handle leak. Because of this, the system runs out of memory.
- This update addresses an issue that affects the Resultant Set of Policy (RSOP). The Windows LAPS “BackupDirectory” policy setting was not being reported. This occurs when the setting is set to 1, which is “Back up to AAD.”
- This update addresses an issue that affects Server Message Block (SMB). You cannot access the SMB shared folder. The errors are, “Not enough memory resources” or “Insufficient system resources.”
- The update addresses an issue that affects scheduled tasks. The tasks fail when they use stored local user account credentials. This occurs when you enable Credential Guard. The error message is “2147943726: ERROR_LOGON_FAILURE (The user name or password is incorrect).”
- The update addresses an issue that affects those who use Windows Update for Business. After you are asked to change your password at sign in, the change operation fails. Then you cannot sign in. The error code is 0xc000006d.
- This update addresses an issue that is related to changes in the forwarding of events.
- This update addresses an issue that affects the Group Policy Service. It will not wait for 30 seconds, which is the default wait time, for the network to be available. Because of this, policies are not correctly processed.
- This update addresses an issue that affects the Remote Desktop (RD) Web Role. If you enable that role, it fails when you upgrade RD deployments more than once.
- This update addresses an issue that affects Narrator. Its focus does not change when the keyboard focus changes. Because of this, Narrator reads the wrong label within the dialog that appears when you sign in.
- This update addresses an issue that affects authentication. Using a smart card to join or rejoin a computer to an Active Directory domain might fail. This occurs after you install Windows updates dated October 2022 or later. For more details, see KB5020276.
September 2023 Security Updates by Microsoft
You may also like to read more about security updates shared below:
- KB5030287 Security Update for Windows Server 2012 R2
- KB5030278 Monthly Rollup Update for Windows Server 2012
- KB5030269 Monthly Rollup for Windows Server 2012 R2
- KB5030216 Cumulative Update for Windows Server 2022
- KB5030213 Cumulative Update for Windows Server 2016
- KB5030214 Cumulative Update for Windows Server 2019
- KB5030279 Security Update for Windows Server 2012
Rajesh Dhawan is a technology professional who loves to blog about smart wearables, Cloud computing and Microsoft technologies. He loves to break complex problems into manageable chunks of meaningful information.