KB5034122 for Windows 10 versions 21H2 and 22H2

KB5034122 is the cumulative update for Windows 10 version 21H2 and version 22H2. The update was released on 9 January 2024 under the ‘Patch Tuesday’ program.

Salient points

  • KB5034122 is a cumulative update. It supersedes the KB5033372 released in December 2023.
  • KB5034122 corresponds to build 19044.3930 for Windows 10 version 21H2.
  • KB5034122 corresponds to build 19045.3930 for Windows 10 version 22H2.
  • KB5033372 corresponds to build 19044.3803 for Windows 10 version 21H2.
  • KB5033372 corresponds to build 19045.3803 for Windows 10 version 22H2.
  • 32 security vulnerabilities affect the x86 and ARM64 versions of Windows 10 version 21H2 and 22H2. One of these vulnerabilities has a ‘CRITICAL’ severity level.
  • 34 security vulnerabilities affect the x64 versions of Windows 10 version 21H2 and 22H2. Two of these vulnerabilities have a ‘CRITICAL’ severity level.
  • Servicing Stack Update 19044.3745 corresponds to Windows 10 version 21H2. Separate installation of the SSU is not needed as it is included in the main security or cumulative update.
  • Servicing Stack Update 19045.3745 corresponds to Windows 10 version 22H2. Separate installation of the SSU is not needed as it is included in the main security or cumulative update.

There has been no separate release of the Servicing Stack Update for Windows 10 version 21H2 and 22H2 for January 2024.

KB5034122 Prerequisites for installation

For offline OS image servicing:

You need KB5011543 or later cumulative update on the system. KB5011543 was released in March 2022. If this is not possible, please install the May 2022 Servicing Stack Update KB5014032.

For WSUS or Microsoft Catalog packages:

You need KB5003173 cumulative update from May 2021 or later. If this is not possible, please install the August 2021 Servicing Stack Update KB5005260.

Download KB5034122

KB5034122 can be applied automatically using one of the following methods:

  • Windows Update
  • Windows Update for Business
  • WSUS or Windows Server Update Services

WSUS remains the most preferred way to patch Windows 10 workstations. You will need to pull security updates for Windows 10 version 1903 and later.

For manual deployments, you need to download the offline installer file from the Microsoft Update Catalog site. The offline installer needs to be downloaded for the specific Windows 10 version on your computers. Or, you could use the direct download links shared below for the offline installer files for Windows 10 version 21H2 and version 22H2.

Download KB5034122 for Windows 10 version 21H2 and version 22H2

You will need to ensure that the offline installer file corresponding to the platform architecture is used. So, please pick the file relevant for x64, x86 or ARM64 platforms.

Windows 10 21H2 and 22H2 versions for the x64 editions are affected by 34 security vulnerabilities. The ARM64 and x86 editions are also affected by 32 security vulnerabilities.

  • The x64 deployments of Windows 10 version 21H2 and 22H2 are affected by 2 CRITICAL vulnerabilities (CVE-2024-20674 and CVE-2024-20700)
  • The x86 AND ARM64 deployments of Windows 10 version 21H2 and 22H2 are affected by one CRITICAL vulnerability (CVE-2024-20674)

The following are CRITICAL vulnerabilities affecting Windows 10 versions 21H2 and 22H2. As mentioned above, both vulnerabilities affect the x64 edition of Windows 10 versions 21H2 and 22H2. CVE-2024-20674 affects the x86 and ARM64 deployments of Windows 10 versions 21H2 and 22H2.

CVE detailsCVSSSeverityImpact Description
CVE-2024-206749.0CRITICALSecurity Feature BypassThe authentication feature could be bypassed as this vulnerability allows impersonation.

An authenticated attacker could exploit this vulnerability by establishing a machine-in-the-middle (MITM) attack or other local network spoofing technique, then sending a malicious Kerberos message to the client victim machine to spoof itself as the Kerberos authentication server.
CVE-2024-207007.5CRITICALRemote Code ExecutionThis vulnerability is in the Windows Hyper V system. It could cause a ‘Remote Code Execution’ attack.
Successful exploitation of this vulnerability requires that an attacker will need to first gain access to the restricted network before running an attack.

The following changes are part of the KB5034122 for Windows 10 versions 21H2 and 22H2:

  • This update addresses an issue that affects the ActiveX scroll bar. It does not work in IE mode.
  • This update addresses an issue that causes your device to shut down after 60 seconds. This occurs when you use a smart card to authenticate on a remote system.
  • This update addresses an issue that affects the display of a smart card icon. The icon does not appear when you sign in. This occurs when there are multiple certificates on the smart card.

How useful was this post?

Click on a star to rate it!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Rajesh Dhawan

Rajesh Dhawan is a technology professional who loves to blog about smart wearables, Cloud computing and Microsoft technologies. He loves to break complex problems into manageable chunks of meaningful information.