About

Security Update KB5008212 for Windows 10 version 20H2

The December security update for Windows 10 version 20H2 was released by Microsoft on 14th December 2021. The security update KB5008212 addresses 30 vulnerabilities of a critical or important severity for the infrastructure comprising of Windows 10 20H2. Data pertaining to the vulnerabilities does suggest that you may want to plan for maintenance windows to update the Windows 10 20H2 workstations on your corporate or business network. Below, we will look at the process of updating Windows 10 20H2 with the security update KB5008212. We will have a look at the various vulnerabilities that get addressed as part of the KB5008212 security update for Windows 10 20H2.

Where can I get KB5008212 security update for Windows 10 20H2?

The KB5008212 security update for Windows 10 20H2 has been made available by Microsoft. This update will take your Windows 10 20H2 to build 19042.1415. You could take one of the following published methods to update Windows 10 20H2 with KB5008212.

  • You can download the KB5008212 security update from the Microsoft Update catalog. The download link for KB5008212 for Windows 10 20H2 is – https://www.catalog.update.microsoft.com/Search.aspx?q=KB5008212. On the page, you will need to choose specific update files for Windows 10 20H2. For 32 bit system, please download the x86 update patch. This patch weighs 303.8 MB. To download security update KB5008212 for 64 bit system, you may download the x64 version of the security update for Windows 10 version 20H2. This patch weighs 679 MB. Both links for 32 bit and 64 bit processors are given below for your ready reference. Both download links are from the Microsoft Update Catalog.
  • Download link for 32 bit systems of Windows 10 version 20H2 – 32 bit processors.
  • Download link for 64 bit systems of Windows 10 version 20H2 – 64 bit processors.
  • KB5008212 can be automatically downloaded using the Windows Update program on your Windows 10 computer.
  • KB5008212 can also be downloaded using the Windows Update for Business for the Windows 10 Pro computers.
  • Windows Server Update Service (WSUS) can also be used to synchronize the KB5008212 security update with Windows 10 if the system is configured to work with Windows 10 and download the security updates.

These updates are downloadable in the .msu file format.

You may use a manual approach to downloading and publishing the KB5008212 update on the Windows 10 20H2 version. It would definitely give you better control over the update process. A reboot may be needed to finalize the KB5008212 security update on Windows 10 20H2.

Quality Improvements or bug fixes in KB5008212 for Windows 10 20H2

The KB5008212 security update takes in the features from the Windows 10 version 2004 and integrates all these on the Windows 10 20H2. There are no additional details about the various bugs or improvements that have been made on the Windows 10 version 20H2.

Critical vulnerabilities resolved under KB5008212 on Windows 10 20H2

There are three critical vulnerabilities that have been resolved in the security update KB5008212 for Windows 10 20H2 version. All these vulnerabilities are the ‘remote code execution’ vulnerabilities. A remote code execution vulnerability allows a remote attacker to deploy and execute malicious code on the vulnerable target computer. The details of the three critical vulnerabilities that are patches in KB5008212 are mentioned below:

  • CVE-2021-43215 – this is a remote code execution vulnerability with a CVSS score of 9.8. It requires immediate patching. An attacker could send a specially crafted request to the Internet Storage Name Service (iSNS) server, which could result in remote code execution.
  • CVE-2021-43217 – this is a remote code execution vulnerability with a CVSS score of 8.1. It requires immediate patching. An attacker could cause a buffer overflow write leading to unauthenticated non-sandboxed code execution. This vulnerability affects the Windows Encrypting File System (EFS).
  • CVE-2021-43233 – this is a remote code execution vulnerability that has a CVSS score of 7.5. It affects the Remote Desktop Client software. The vulnerability requires immediate patching.

The CVSS 9.8 critical vulnerability is a grave risk for the Windows 10 20H2 based network, corporate, or business infrastructure. All these critical vulnerabilities need immediate resolution through patching of KB5008212 on Windows 10 20H2.

Remote code execution vulnerabilities with important severity on KB5008212 for Windows 10 20H2

There have been two additional remote code execution vulnerabilities that are resolved as part of the KB5008212 security update for Windows 10 20 H2. Both these vulnerabilities carry a CVSS score of 7.8 and bear an ‘important’ severity for the affected infrastructure. Details of the two important severity vulnerabilities that have been patched in KB5008212 are shared below:

  • CVE-2021-43232 – carries a CVSS score of 7.8 and affects the Windows Event Tracing Service.
  • CVE-2021-43234 – carries a CVSS score of 7.8 and affects Windows Fax Service.

The remote code execution vulnerabilities are above and ahead of the three critical vulnerabilities that we discussed above.

Elevation of Privileges vulnerabilities resolved in KB5008212 for Windows 10 20H2

Elevation of privileges carries data theft risks for vulnerable networks and computers. An attacker could assume elevated authentication details to cause collateral damage to the compromised target. This could include the deployment of trojans or attack vectors.

There are 15 elevation of privileges vulnerabilities that have been patched as part of the KB5008212 for Windows 10 20H2. These vulnerabilities have important severity for the affected systems of Windows 10 20H2. The 15 elevation of privileges (EoP) that are resolved in Windows 20H2 are:

  • CVE-2021-43893 – CVSS score of 7.5 and affects Windows Encrypting File System (EFS)
  • CVE-2021-43883 – CVSS score of 7.8 and affects Windows Installer
  • CVE-2021-43248 – CVSS score of 7.8 and affects Windows Digital Media Receiver
  • CVE-2021-43247 – CVSS score of 7.8 and affects Windows TCP/IP driver.
  • CVE-2021-43240 – CVSS score of 7.8 and affects Windows NTFS Set Short Name.
  • CVE-2021-43239 – CVSS score of 7.1 and affects Windows Recovery Environment Agent.
  • CVE-2021-43238 – CVSS score of 7.8 and affects Windows Remote Access.
  • CVE-2021-43237 – CVSS score of 7.8 and affect Windows Setup.
  • CVE-2021-43231 – CVSS score of 7.8 and affects Windows NTFS.
  • CVE-2021-43230 – CVSS score of 7.8 and affects Windows NTFS.
  • CVE-2021-43229 – CVSS score of 7.8 and affects Windows NTFS.
  • CVE-2021-43226 – CVSS score of 7.8 and affects Windows Common Log File System Driver.
  • CVE-2021-43223 – CVSS score of 7.8 and affects Windows Remote Access Connection Manager.
  • CVE-2021-41333 – CVSS score of 7.8 and affects Windows Print Spooler.
  • CVE-2021-43207 – CVSS score of 7.8 and affects Windows Common Log File System Driver.

Most EoP vulnerabilities carry significant CVSS levels of 7.8. Immediate deployment of the KB5008212 may be required.

Information Disclosure vulnerability patches in KB5008212 for Windows 10 20H2

There are 7 information disclosure vulnerabilities on the Windows 10 version 20H2 that are addressed as part of the security update KB5008212. All these vulnerabilities post significant challenges of personal and business data loss. The 7 information disclosure vulnerabilities that have been resolved in KB5008212 for Windows 10 20H2 are mentioned below.

  • CVE-2021-43244 – CVSS score of 6.5 and affects Windows Kernel.
  • CVE-2021-43236 – CVSS score of 7.5 and affects Microsoft Messaging Queue
  • CVE-2021-43235 – CVSS score of 5.5 and affects the ‘Storage Spaces Controller’.
  • CVE-2021-43227 – CVSS score of 5.5 and affects the ‘Storage Spaces Controller’.
  • CVE-2021-43224 – CVSS score of 5.5 and affects the Windows Common Log File System Driver.
  • CVE-2021-43222 – CVSS score of 7.5 and affects Microsoft Messaging Queue.
  • CVE-2021-43216 – CVE-2021-43216 – CVSS score of 6.5 and affects Microsoft Local Security Authority Server (lsasrv).

Denial of Service vulnerabilities resolved in KB5008212 for Windows 10 version 20H2

Denial of Service (DoS) vulnerabilities have a direct impact on the services and operations of a business. 3 Denial of Service vulnerabilities have been patched as part of the KB5008212 security update for Windows 10 20H2. These vulnerabilities are given below for your ready reference.

  • CVE-2021-43246 – carries a CVSS score of 5.6 and affects Windows Hyper V service.
  • CVE-2021-43228 – carries a CVSS score of 7.5 and affects SymCrypt.
  • CVE-2021-43219 – carries a CVSS score of 7.4 and affects DirectX Graphics Kernel File.

Details of all 30 security vulnerabilities that have been patched as part of the security update KB5008212 have been shared with you. It makes a compelling case for the Windows 10 20H2 systems to be updated with the cumulative update and be in a good and steady state.

You may also like to read the following content related to Windows Security Updates: