KB5033118 Cumulative Update for Windows Server 2022

This content has been archived. But, the content is true and relevant to the underlying technology products or infrastructure services.

KB5033118 is a cumulative update for Windows Server 2022 and Windows Server 2022 Server Core installation. The update was released on 12 December 2023 as part of the ‘Patch Tuesday’ project of Microsoft.

  • KB5033118 has been su[perseded by KB5034129 in January 2024.
  • KB5033118 is a cumulative update that supersedes the KB5032198 cumulative update.
  • KB5033118 is for Windows Server 2022 21H2 and 22H2 editions only.
  • KB5032198 was released on 14 November 2023 and you can read more about it on this KB5032198 page.
  • KB5033118 corresponds to build 20348.2159. KB5032198 corresponds to server build 20348.2113. If you had installed KB5032198, you would be transitioning from build 2113 to 2159.
  • 20348.2084 is the Servicing Stack Update that corresponds to the KB5032198 update. The Servicing Stack Update for Windows Server 2022 is a part of the main cumulative update. Separate installation of Servicing Stack Update is not required on Windows Server 2022.
  • Servicing Stack Update 20348.2084 was released in November 2023. There is no new SSU release for December 2023 for Windows Server 2022.
  • 18 security vulnerabilities have been reported for Windows Server 2022 in the December 2023 security bulletin released by Microsoft.
  • 3 of these security vulnerabilities have a CRITICAL severity level for Windows Server 2022.
  • 1 Zero-day threat affects Windows Server 2019. CVE-2023-20588 is the zero-day threat impacting AMD servers> it could lead to ‘Loss of confidentiality’ attack.

Details of security vulnerabilities on Windows Server 2022 are listed in the vulnerabilities section below.

KB503318 can be applied automatically using one of the following methods:

  • Windows Update
  • Windows Update for Business
  • WSUS or Windows Server Update Services

WSUS remains the most preferred method to automatically deploy security and cumulative updates.

For automated deployments, the Servicing Stack Update 20348.2084 will be automatically installed as part of the installation of the KB5033118 update on Windows Server 2022. If you installed KB5032198 in November 2023, the SSU will already have been deployed.

For manual deployment of KB5033118, you will need to follow a 1-step process.

  • Download and install KB5033118 cumulative update.

The download of the cumulative update KB5033118 can be completed from the Microsoft Update Catalog site. The installer is available as an offline installer file in the .MSU format for Windows Server 2022 version 21H2 and Windows Server 2022 version 22H2.

KB5033118 for Windows Server 2022 can be downloaded from the Microsoft Update Catalog site. Or, you could use the direct download link below.

The size of the cumulative update KB5033118 file for the 21H2 and 22H2 versions of Windows Server 2022 is 369.4 MB. KB5033118 will cause a server reboot. Please plan for implementation as part of an organized change management process.

If you installed KB5032198 in November 2023, only the incremental changes of KB5033118 will be applied to the server. This will be a relatively very quick update process because the full cumulative update is not downloaded or installed.

18 security vulnerabilities affect Windows Server 2022 as part of the December 2023 security reports. 3 of these vulnerabilities are CRITICAL severity vulnerabilities. There is a single zero-day threat that affects Windows Server 2022.

The remaining 15 security vulnerabilities have IMPORTANT severity levels.

We have listed the CRITICAL vulnerabilities and the zero-day threat for Windows Server 2022 below.

The zero-day vulnerabilities are publicly known and exploited vulnerabilities. Therefore, immediate patching needs to be carried out to mitigate the risk arising out of zero-day vulnerabilities within the IT infrastructure.

The following zero-day threat was first reported in August 2023. It has been mitigated in the current Windows Update cycle. Therefore, we suggest immediate deployment of the cumulative update KB5033118.

CVE detailsCVSSSeverityImpact Description
CVE-2023-205885.5IMPORTANTLoss of confidentialityA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.

There are 3 CRITICAL security vulnerabilities affecting Windows Server 2022 and Windows Server 2022 Server Core installation. All these CRITICAL vulnerabilities could lead to a ‘Remote Code Execution’ impact on the server.

The three CRITICAL security vulnerabilities on Windows Server 2022 are listed below.

CVE detailsCVSSSeverityImpact Description
CVE-2023-356308.8CRITICALRemote Code ExecutionThis threat impacts the Internet Connection Sharing (ICS).

Successful exploitation of this vulnerability requires the attacker to modify an option->length field in a DHCPv6 DHCPV6_MESSAGE_INFORMATION_REQUEST input message.
This attack is limited to systems connected to the same network segment as the attacker. 
CVE-2023-356288.1CRITICALRemote Code ExecutionThis vulnerability arises on account of Windows MSHTML Platform.

The attacker could exploit this vulnerability by sending a specially crafted email which triggers automatically when it is retrieved and processed by the Outlook client. This could lead to exploitation BEFORE the email is viewed in the Preview Pane.

This could result in the attacker executing remote code on the victim’s machine.
CVE-2023-356418.8CRITICALRemote Code ExecutionThis threat affects the Internet Connection Sharing (ICS).

To exploit this vulnerability, an attacker would need to send a maliciously crafted DHCP message to a server that runs the Internet Connection Sharing service.

This attack is limited to systems connected to the same network segment as the attacker

The following changes or improvements are part of the KB5033118 cumulative update for Windows Server 2022:

  • This update affects the Netherlands time zone. It adds the recent man-made landmass outside of Rotterdam to the shape files.
  • This update affects Microsoft Defender for Endpoint (MDE). It enables Conditional Access (CA) scenarios.
  • This update addresses security issues for your Windows operating system. 

December 2023 Cumulative or Security Updates

Rajesh Dhawan

Rajesh Dhawan is a technology professional who loves to blog about smart wearables, Cloud computing and Microsoft technologies. He loves to break complex problems into manageable chunks of meaningful information.