Applies ToWindows Server, version 23H2

Release Date:

14/05/2024

Version:

OS Build 25398.887

For information about Windows update terminology, see the article about the types of Windows updates and the monthly quality update types. For an overview of Windows Server, version 23H2, see its update history page.      

Improvements 

This security update includes quality improvements. When you install this KB: 

  • This update addresses an issue that affects IE mode. A webpage stops working as expected when there is an open modal dialog.

  • This update addresses an issue in that affects IE mode. It stops responding. This occurs if you press the left arrow key when an empty text box has focus and caret browsing is on.

  • This update addresses an issue that affects Wi-Fi Protected Access 3 (WPA3) in the Group Policy editor. HTML preview rendering fails.

  • This update addresses an issue that affects Packet Monitor (pktmon). It is less reliable.

  • This update addresses an issue that affects a server after you remove it from a domain. The Get-LocalGroupMember cmdlet returns an exception. This occurs if the local groups contain domain members.

  • This update affects next secure record 3 (NSEC3) validation in a recursive resolver. Its limit is now 1,000 computations. One computation is equal to the validation of one label with one iteration. DNS Server Administrators can change the default number of computations. To do this, use the registry setting below.

    • Name: \HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters\MaxComputationForNsec3Validation

    • Type: DWORD

    • Default: 1000

    • Max: 9600

    • Min: 1

  • This update addresses an issue that might affect the cursor when you type in Japanese. The cursor might move to an unexpected place.

  • This update addresses an issue that affects the cursor. Its movement lags in some screen capture scenarios. This is especially true when you are using the remote desktop protocol (RDP).

  • This update includes quarterly changes to the Windows Kernel Vulnerable Driver Blocklist file, DriverSiPolicy.p7b. It adds to the list of drivers that are at risk for Bring Your Own Vulnerable Driver (BYOVD) attacks.

  • This update addresses an issue that affects Trusted Platform Modules (TPM). On certain devices, they did not initialize correctly. Because of this, TPM-based scenarios stopped working.

  • This update addresses an issue that affects Active Directory. Bind requests to IPv6 addresses fail. This occurs when the requestor is not joined to a domain.

  • This update addresses an issue that might affect Virtual Secure Mode (VSM) scenarios. They might fail. These scenarios include VPN, Windows Hello, Credential Guard, and Key Guard.

  • This update addresses an issue that might affect domain controllers (DC). NTLM authentication traffic might increase.

  • This update addresses a known issue that might cause your VPN connection to fail. This occurs after you install the update dated April 9, 2024, or later.

  • This update affects Windows Defender Application Control (WDAC). The update addresses an issue that might cause some apps to fail when you apply WDAC Application ID policies.

For more information about security vulnerabilities, please refer to the Security Update Guide and the May 2024 Security Updates

Windows Server, version 23H2 servicing stack update - 25398.880

This update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.

Known issues in this update

Microsoft is not currently aware of any issues with this update.

How to get this update

Before installing this update

Microsoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.

Install this update

Release Channel

Available

Next Step

Windows Update and Microsoft Update

Yes

None. This update will be downloaded and installed automatically from Windows Update.

Windows Update for Business

Yes

None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies.

Microsoft Update Catalog

Yes

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Windows Server Update Services (WSUS)

Yes

This update will automatically sync with WSUS if you configure Products and Classifications as follows:

Product: Microsoft Server operating system-21H2

Classification: Security Updates

If you want to remove the LCU

To remove the LCU after installing the combined SSU and LCU package, use the DISM/Remove-Package command line option with the LCU package name as the argument. You can find the package name by using this command: DISM /online /get-packages.

Running Windows Update Standalone Installer (wusa.exe) with the /uninstall switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.

File Information 

For a list of the files that are provided in this update, download the file information for cumulative update 5037781.

For a list of the files that are provided in the servicing stack update, download the file information for the SSU - version 25398.880

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.