SummaryÂ
This security update resolves a Microsoft Office remote code execution vulnerability, Microsoft Word information disclosure vulnerability, and Microsoft SharePoint remote code execution vulnerability. To learn more about the vulnerabilities, see the following security advisories:
-
Microsoft Common Vulnerabilities and Exposures CVE-2025-54906
-
Microsoft Common Vulnerabilities and Exposures CVE-2025-54905
-
Microsoft Common Vulnerabilities and Exposures CVE-2025-54897
Notes:Â
-
This is build 16.0.10417.20047 of the security update package.
-
To apply this security update, you must have the release version of Microsoft SharePoint Server 2019 installed on the computer.
Improvements and fixes
This security update contains improvements and fixes for the following nonsecurity issue in SharePoint Server 2019.Â
-
To strengthen security in SharePoint Server, users in the WSS_WPG group are now restricted from running administrative processes, such as the SharePoint Products Configuration Wizard (Psconfig). For more information, see Account permissions and security settings in SharePoint Servers.
-
You can now use the Test-DefenderAndAmsiWorkProperly cmdlet in SharePoint Management Shell to verify that all Windows Defender components are installed and active, and that SharePoint AMSI (Antimalware Scan Interface) integration is functioning correctly.
-
In order to use workflows in SharePoint Server, you must now have the latest update for SharePoint Workflow Manager installed.
-
Fixes an issue in which some characters cannot be displayed correctly in email messages if they use the GB18030 character set for outgoing email.
-
Enables the automatic machine key rotation feature.
-
Enhances the AMSI Filter feature module. Changes the default setting to be always on.
How to get and install the update
Method 1: Microsoft Update
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Method 3: Microsoft Download Center
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
More information
Security update deployment information
For deployment information about this update, see Deployments - Security Update Guide.
Security update replacement information
This security update replaces previously released security update 5002769.
File hash information
File name |
SHA256 hash |
---|---|
sts2019-kb5002775-fullfile-x64-glb.exe |
9B2D1BE687FF16F7CFA8877F98E9674E8BD6EFCE05F7B090D8E7A7F19E558C64 |
File information
Download the list of files that are included in security update 5002775.
Information about protection and security
Protect yourself online:Â Windows Security support
Learn how we guard against cyber threats: Microsoft Security​​​​​​​