Sign in with Microsoft
Sign in or create an account.
Hello,
Select a different account.
You have multiple accounts
Choose the account you want to sign in with.

Summary

This security update resolves a Microsoft SharePoint Server spoofing vulnerability. To learn more about the vulnerability, see the Microsoft Common Vulnerabilities and Exposures CVE-2021-36940.

Note: To apply this security update, you must have the release version of Microsoft SharePoint Enterprise Server 2016 installed on the computer.

This public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:

  • SharePoint Framework (SPFx)

This public update also delivers all the features that were included in Feature Pack 1 for SharePoint Server 2016, including:

  • Administrative Actions Logging

  • MinRole enhancements

  • SharePoint Custom Tiles

  • Hybrid Taxonomy

  • OneDrive API for SharePoint on-premises

  • OneDrive for Business modern user experience (available to Software Assurance customers)

The OneDrive for Business modern user experience requires an active Software Assurance contract at the time that the experience is enabled, either by installation of the public update or by manual enablement. If you don't have an active Software Assurance contract at the time of enablement, you must turn off the OneDrive for Business modern user experience.

For more information, see the following Microsoft Docs articles:

Improvements and fixes

This security update contains fixes for the following nonsecurity issues in SharePoint Server 2016:

  • In certain repetitive scenarios, the relevant worker process displays an increasing memory consumption pattern that's eventually followed by process termination. This update fixes this issue by ensuring a standard memory consumption pattern.

  • After you install the May 2021 security updates for SharePoint Server, you can't share documents with other users because the user can't be identified by the given user information.

  • User code is blocked when third-party assemblies access sensitive properties. After you apply this update, you can follow the steps that are provided in KB5004581 to add the third-party assemblies to the assembly list for accessing the sensitive properties in the Web.config file.

How to get and install the update

Method 1: Microsoft Update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 3: Microsoft Download Center

You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

More information

Security update deployment information

For deployment information about this update, see Security update deployment information: Aug 10, 2021 (KB5005247).

Security update replacement information

This security update replaces previously released security update 5001976.

File hash information

File name

SHA256 hash

sts2016-kb5002002-fullfile-x64-glb.exe

4A181E11CCBF016BB1DD472496D375D1AFAC6C2E7E71E5E9318068441A4278CB

File information

Download the list of files that are included in security update 5002002.

Information about protection and security

Protect yourself online: Windows Security support

Learn how we guard against cyber threats: Microsoft Security

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.

Was this information helpful?

What affected your experience?
By pressing submit, your feedback will be used to improve Microsoft products and services. Your IT admin will be able to collect this data. Privacy Statement.

Thank you for your feedback!

×