Applies to:
Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.7.1 Microsoft .NET Framework 4.7.2
:Â Revised on Jun 20, 2023 to add resolution to known issue.
REMINDER Windows Embedded 7 Standard and Windows Server 2008 R2 SP1 have reached the end of mainstream support and are now in extended security update (ESU) support.
Starting in July 2020, there will no longer be optional, non-security releases (known as "C" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the "B" or Update Tuesday release).
Verify that you have installed the required updates listed in the How to get this update section before installing this update. 
Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in KB4522133 to continue receiving security updates after extended support ends on January 14, 2020. For more information on ESU and which editions are supported, see KB4497181. For more information, see the ESU blog.
REMINDER All updates for .NET Framework 4.7.2, 4.7.1, 4.7, 4.6.2, 4.6.1, and 4.6 require that the d3dcompiler_47.dll update is installed. We recommend that you install the included d3dcompiler_47.dll update before you apply this update. For more information about the d3dcompiler_47.dll, see KB 4019990.
If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
The February 14, 2023 update for Windows Embedded 7 Standard and Windows Server 2008 R2 SP1 and Windows Server 2008 SP2 includes cumulative reliability improvements in .NET Framework 4.6.2, 4.7, 4.7.1, 4.7.2. We recommend that you apply this update as part of your regular maintenance routines. Verify that you have installed the required updates listed in the How to get this update section before installing this update.
Summary
CVE-2023-21808 - .NET Framework Remote Code Execution Vulnerability CVE-2023-21808.
This security update addresses a vulnerability in the MSDIA SDK where an untrusted pointer dereference can cause memory corruption, leading to a crash or remove code execution. For more information please seeCVE-2023-21722 - .NET Framework Denial of Service Vulnerability CVE-2023-21722.
This security update addresses a vulnerability where the Visual Studio WMI Setup Provider Installer can be used by a low level, local attacker to corrupt local files that SYSTEM can writ to, leading to a potential denial of service. For more information please seeAdditional information about this update
The following articles contain additional information about this update as it relates to individual product versions.
-
5022786 Description of the Security Only Update for .NET Framework 2.0, 3.0, 4.6.2 for Windows Server 2008 SP2 (KB5022786)
-
5022783 Description of the Security Only Update for .NET Framework 3.5.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Embedded 7 Standard and Windows Server 2008 R2 SP1 (KB5022783)
Known issues in this update
Symptom |
After installing this update, WPF apps may have a change in behavior. For more information about this issue, see KB5022083 |
Workaround |
To mitigate this issue, see KB5022083. |
Resolution |
This issue has been resolved in the June 13, 2023 Security and Quality Rollup and Cumulative Update. If you used any workaround or mitigations for this issue, they are no longer needed, and we recommend you remove them. To remove workaround review the workaround or alternative workaround which was applied for instructions. The workaround should be removed prior to installing the June update. |
How to obtain and install the update
Before installing this update
Prerequisite:
To apply this update, you must have .NET Framework 4.6.2, 4.7, 4.7.1, 4.7.2 installed.
You must install the updates listed below and restart your device before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.
-
The March 12, 2019 servicing stack update (SSU) (KB4490628) or newer update. To get the standalone package for this SSU, search for it in the Microsoft Update Catalog. This update is required to install updates that are only SHA-2 signed.
-
The latest SHA-2 update (KB4474419) released September 10, 2019 or newer update. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.
-
The Extended Security Updates (ESU) Licensing Preparation Package for Windows 7 standard and Windows Server 2008 R2 is (KB5017397) released September 13, 2022 or newer update. The Extended Security Updates (ESU) Licensing Preparation Package for Windows Server 2008 is (KB5016129) released july 12, 2022 or newer update. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the Microsoft Update Catalog.
Install this update
Release Channel |
Available |
Next Step |
Microsoft Update Catalog |
Yes |
To get the standalone package for this update, go to the Microsoft Update Catalog website. |
Windows Server Update Services (WSUS) |
Yes |
This individual .NET Framework product update will be installed, as applicable, by applying the operating system update. For more information about operating system updates see additional information about this update section. |
Restart requirement
You may need to restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.
Update deployment information
For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:
20230214 Security update deployment information: February 14, 2023
Update removal information
Note We do not recommend that you remove any security update. To remove this update, use the Programs and Features item in Control Panel.
Update restart information
This update does not require a system restart after you apply it unless files that are being updated are locked or are being used.
File Information
x86 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
x64 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Prerequisites
To apply this update, you must have .NET Framework 4.6.2, 4.7, 4.7.1, 4.7.2 installed.
Restart requirement
You must restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.
How to obtain help and support for this update
-
Help for installing updates: Windows Update FAQ
-
Protect yourself online and at home: Windows Security support
-
Local support according to your country: International Support