KB5030216 Cumulative Update for Windows Server 2022

KB5030216 is the cumulative update for Windows Server 2022 and Windows Server 2022 Server Core installation for the month of September 2023. The update was released by Microsoft on 12th September 2023 as part of the ‘Patch Tuesday’ initiative.

Salient points

  • KB5030216 has now been superseded by KB5031364. KB5031364 was released on 10 October 2023. You can read more about KB5031364 on this page.
  • KB5030216 is a cumulative update that supersedes the KB5029250 cumulative update. KB5029250 was released on 8th August 2023.
  • KB5030216 corresponds to server build 20348.1970. KB5029250 corresponds to server build 20348.1906. Assuming you had installed the KB5029250 cumulative update in August 2023, you will now upgrade from build 1906 to build 1970.
  • The update fixes LSASS issues on Windows Server 2022. It also resolves issues affecting Windows Update for Business.
  • The update also fixes issues with creating Virtual machines on the Azure framework.
  • The Servicing Stack Update 20348.1960 is part of the cumulative update. It is installed automatically as part of the update process. No separate files for the Servicing Stack Update are released for Windows Server 2022.
  • 19 security vulnerabilities have been disclosed for Windows Server 2022 as part of September month’s security bulletin released by Microsoft
  • CVE-2023-36802 is a zero-day threat that has already been exploited by threat actors. This zero-day threat affects Windows Server 2022 and Windows Server 2022 Server Core installation. It is shared in the vulnerabilities section.

Download KB5030216

The best approach to installing KB5030216 remains the automated methods shared below:

  • Windows Update
  • Windows Update for Business
  • WSUS or Windows Server Update Service

WSUS remains the preferred method of rolling out updates on Windows Server 2022.

If you would prefer to install the KB5030216 update manually, you will need to download an offline installer file from the Microsoft site. The offline installer file is in MSU format.

You will also need to ensure that the offline installer file is downloaded for the specific Windows Server 2022 version. There are separate files for:

  • Windows Server 2022 version 22H2
  • Windows Server 2022 version 21H2

For ready reference, we have shared the download links for KB5030216 below.

Vulnerabilities

There are 19 security vulnerabilities on Microsoft Windows Server 2022. These have been disclosed in the September 2023 security bulletin released by Microsoft.

None of these threats have a ‘CRITICAL’ severity level.

However, there is a single zero-day threat that affects Windows Server 2022. The details of the zero-day threat are shared below:

  • CVE-2023-36802
  • The vulnerability has a CVSS score of 7.8.
  • This vulnerability affects the Microsoft Streaming Service Proxy.
  • It is an Elevation of Privilege vulnerability in which an attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

KB5030216 – Changelog

The following changes are part of the KB5030216 cumulative update for Windows Server 2022:

  • This update affects firewall settings. You can now make changes that allow you to configure application group rules.
  • This update supports daylight saving time (DST) changes in Israel.
  • This update addresses an issue that affects Server Message Block (SMB). You cannot access the SMB shared folder. The errors are, “Not enough memory resources” or “Insufficient system resources.” 
  • The update addresses an issue that affects scheduled tasks. The tasks fail when they use stored local user account credentials. This occurs when you enable Credential Guard. The error message is “2147943726: ERROR_LOGON_FAILURE (The user name or password is incorrect).”
  • This update addresses an issue that affects the Local Security Authority Subsystem Service (LSASS). It stops responding. This occurs when you use Azure Virtual Desktop (AVD).
  • The update addresses an issue that affects those who use Windows Update for Business. After you are asked to change your password at sign in, the change operation fails. Then you cannot sign in. The error code is 0xc000006d.
  • This update addresses an issue that affects the Local Security Authority Subsystem Service (LSASS) process. It might stop responding. Because of this, the machine restarts. The error is 0xc0000005 (STATUS_ACCESS_VIOLATION).
  • This update addresses an issue that affects the Tab Window Manager. It stops responding when you use IE mode.
  • This update addresses an issue that is related to changes in the forwarding of events.
  • This update addresses an issue that affects the Group Policy Service. It will not wait for 30 seconds, which is the default wait time, for the network to be available. Because of this, policies are not correctly processed.
  • This update adds a new API for D3D12 Independent Devices. You can use it to create multiple D3D12 devices on the same adapter. To learn more, see D3D12 Independent Devices.
  • This update addresses an issue that affects virtual machines (VM). Creating new VMs fails for Azure Stack Hub customers. This occurs when you add a new node to a cluster.
  • This update addresses an issue that affects certain VMs. Deploying them fails. This occurs because certain VM images do not respond to Address Resolution Protocol (ARP) requests if the source is outside of the local network.
  • This update addresses an issue that affects Azure Stack HCI customers. Your attempts to create VMs fail. This occurs when you delete and recreate server Representational State Transfer (REST) resources for the Network Controller.
  • This update addresses an issue that affects print jobs that are sent to a virtual print queue. They fail without an error.
  • This update affects Windows Defender Application Control (WDAC). Its policy to block software based on a hash might not stop the software from running.
  • This update affects unsigned WDAC policies. They are copied to the Extensible Firmware Interface (EFI) disk partition. It is reserved for signed policies.
  • This update addresses an issue that affects the Remote Desktop (RD) Web Role. If you enable that role, it fails when you upgrade RD deployments more than once.
  • This update addresses an issue that affects Narrator. Its focus does not change when the keyboard focus changes. Because of this, Narrator reads the wrong label within the dialog that appears when you sign in.
  • This update addresses an issue that affects the Microsoft Distributed Transaction Coordinator (DTC). It has a handle leak. Because of this, the system runs out of memory.
  • This update addresses an issue that affects the Resultant Set of Policy (RSOP). The Windows LAPS “BackupDirectory” policy setting was not being reported. This occurs when the setting is set to 1, which is “Back up to AAD.”
  • This update addresses an issue that affects authentication. Using a smart card to join or rejoin a computer to an Active Directory domain might fail. This occurs after you install Windows updates dated October 2022 or later. For more details, see KB5020276.
  • This update addresses an issue that affects DPM 2019 and DPM 2022. When you try to install them, it fails. This occurs because the Resilient File System (ReFS) stops responding.

September 2023 Security Updates by Microsoft

You may also like to read more about security updates shared below:

How useful was this post?

Click on a star to rate it!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Rajesh Dhawan

Rajesh Dhawan is a technology professional who loves to blog about smart wearables, Cloud computing and Microsoft technologies. He loves to break complex problems into manageable chunks of meaningful information.