Improvements and fixes
This update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:
- Provides support to control usage of Indirect Branch Prediction Barrier (IBPB) on some AMD processors (CPUs) for mitigating CVE-2017-5715, Spectre Variant 2 when switching from user context to kernel context. (See AMD Architecture Guidelines for Indirect Branch Control and AMD Security Updates for more details). For Windows client (IT pro) guidance, follow the instructions in KB4073119. Use this guidance document to enable IBPB on some AMD processors (CPUs) for mitigating Spectre Variant 2 when switching from user context to kernel context.
- Provides protections from an additional subclass of speculative execution side channel vulnerability known as Speculative Store Bypass (CVE-2018-3639). These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in KB4073119. Use this guidance document to enable mitigations for Speculative Store Bypass (CVE-2018-3639) in addition to the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).
- Addresses an issue that sometimes prevents eDrives from unlocking when an eDrive is a secondary drive and the system drive is protected with BitLocker.
Addresses an issue where firmware updates cause devices to go into BitLocker recovery mode when BitLocker is enabled but Secure Boot isn't present or disabled. This update prevents firmware installation on devices in this state. Administrators can install firmware updates by:
- Temporarily suspending BitLocker.
- Immediately installing firmware updates before the next OS startup.
- Immediately restarting the device so that BitLocker doesn’t remain in the suspended state.
- Addresses an issue where booting with Unified Write Filter (UWF) enabled may lead to stop error 0xE1 on embedded devices, particularly when using a USB hub.
- Increased the Internet Explorer cookie limit from 50 to better align with industry standards
- Security updates to Internet Explorer, Microsoft Edge, Microsoft scripting engine, Windows apps, Windows Server, Windows wireless networking, Windows storage and filesystem, remote code execution, and Windows virtualization and kernel.
If you installed earlier updates, only the new fixes in this package will be downloaded and installed on your device.
For more information about the resolved security vulnerabilities, see the Security Update Guide.
Windows Update Improvements
Microsoft has released an update directly to the Windows Update client to improve reliability. Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 Feature Update based on device compatibility and Windows Update for Business deferral policy. This does not apply to long-term servicing editions.
Known issues in this update
Microsoft is not currently aware of any issues with this update.
How to get this update
This update will be downloaded and installed automatically from Windows Update. To get the standalone package for this update, go to the Microsoft Update Catalog website.
For a list of the files that are provided in this update, download the file information for cumulative update 4284860.