Applies to:
Microsoft .NET Framework 3.5.1
REMINDER Windows Embedded 7 Standard and Windows Server 2008 R2 SP1 have reached the end of mainstream support and are now in extended security update (ESU) support.
Starting in July 2020, there will no longer be optional, non-security releases (known as "C" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the "B" or Update Tuesday release).
Verify that you have installed the required updates listed in the How to get this update section before installing this update. 
Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in KB4522133 to continue receiving security updates after extended support ends on January 14, 2020. For more information on ESU and which editions are supported, see KB4497181. For more information, see the ESU blog.
The September 12, 2023 update for Windows Embedded 7 Standard and Windows Server 2008 R2 SP1 includes security improvements in .NET Framework 3.5.1. We recommend that you apply this update as part of your regular maintenance routines. Verify that you have installed the required updates listed in the How to get this update section before installing this update.
Summary
CVE-2023-36796 - .NET Framework Remote Code Execution Vulnerability CVE 2023-36796.
This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information seeCVE-2023-36792 - .NET Framework Remote Code Execution Vulnerability CVE-2023-36792.
This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information seeCVE-2023-36793 - .NET Framework Remote Code Execution Vulnerability CVE-2023-36793.
This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information seeCVE-2023-36794 - .NET Framework Remote Code Execution Vulnerability CVE-2023-36794.
This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information seeCVE-2023-36788 - .NET Framework Remote Code Execution Vulnerability CVE 2023-36788.
This security update addresses a vulnerability in the WPF XAML parser where an unsandboxed parser can lead to remote code execution. For more information seeAdditional information about this update
The following articles contain additional information about this update as it relates to individual product versions.
-
5030173 Description of the Security Only Update for .NET Framework 3.5.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Embedded 7 Standard and Windows Server 2008 R2 SP1 (KB5030173)
Known issues in this update
Microsoft is not currently aware of any issues in this update.
How to get this update
Before installing this update
Prerequisite:
To apply this update, you must have .NET Framework 3.5.1 installed.
You must install the updates listed below and restart your device before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.
-
The March 12, 2019 servicing stack update (SSU) (KB4490628). To get the standalone package for this SSU, search for it in the Microsoft Update Catalog. This update is required to install updates that are only SHA-2 signed.
-
The latest SHA-2 update (KB4474419) released September 10, 2019 or newer update. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.
-
To get this security update, you must reinstall the "Extended Security Updates (ESU) Licensing Preparation Package" (KB5016892) for Windows Server 2008 R2 SP1 that is dated August 8, 2022 even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the Microsoft Update Catalog.
-
After you install the items above, we strongly recommend that you install the latest SSU.
​​​​​​​For Windows Server 2008 R2 SP1, you must have the servicing stack update (SSU) (KB5017397) that is dated September 13, 2022 or later installed. For more information about the latest SSU updates, see ADV990001 | Latest Servicing Stack Updates. If you use Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the Microsoft Update Catalog. For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.
-
Download the ESU MAK add-on key from the VLSC portal and deploy and activate the ESU MAK add-on key. If you use the Volume Activation Management Tool  (VAMT) to deploy and activate keys, follow the instructions here.
IMPORTANT You do not need an additional key for deployment of the following:
-
You do not need to deploy an additional ESU key for Azure virtual machines (VMs), Azure Stack HCI.
-
For other Azure products such as Azure VMWare, Azure Nutanix solution Azure Stack (Hub, Edge), or for bring-your-own images on Azure for Windows Server 2008 SP2, and Windows Server 2008 R2 SP1 you do need to deploy the ESU key. The steps to install, activate, and deploy ESUs are the same for the fourth year of ESU coverage.
-
Install this update
Release Channel |
Available |
Next Step |
Windows Update and Microsoft Update |
No |
See the other options below. |
Microsoft Update Catalog |
Yes |
To get the standalone package for this update, go to the Microsoft Update Catalog website. |
Windows Server Update Services (WSUS) |
Yes |
This individual .NET Framework product update will be installed, as applicable, by applying the operating system update. For more information about operating system updates see additional information about this update section. |
Restart requirement
You may need to restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.
Update deployment information
For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:
20230912 Security update deployment information: September 12, 2023
File Information
File hash information
File name |
SHA256 hash |
windows6.1-kb5029948-x86.msu |
ACA939721C31BFDBDE0FA4A1F8E4B3ABAD38C2B0A998C0DD1A5B25BB816EE81B |
windows6.1-kb5029948-x64.msu |
297D562EE996A0F4A22858A07582DCF4F168F915811C24B8982D8C0769208CB5 |
File name |
File version |
File size |
Date |
Time |
Platform |
Presentationframework.dll |
3.0.6920.8957 |
5,296,128 |
04-Aug-2023 |
00:15 |
x86 |
Reachframework.dll |
3.0.6920.8957 |
536,576 |
04-Aug-2023 |
00:15 |
x86 |
Windowsbase.dll |
3.0.6920.8957 |
1,257,472 |
04-Aug-2023 |
00:15 |
x86 |
Presentationcore.dll |
3.0.6920.8957 |
4,222,976 |
04-Aug-2023 |
00:15 |
x86 |
Presentationfontcache.exe.config |
Not applicable |
161 |
21-Jul-2023 |
00:20 |
Not applicable |
Wpfgfx_v0300.dll |
3.0.6920.8957 |
1,741,192 |
04-Aug-2023 |
00:15 |
x86 |
System.printing.dll |
3.0.6920.8957 |
372,736 |
04-Aug-2023 |
00:15 |
x86 |
Penimc.dll |
3.0.6920.8957 |
72,112 |
04-Aug-2023 |
00:15 |
x86 |
Presentationframework.dll |
3.0.6920.8957 |
5,296,128 |
04-Aug-2023 |
00:15 |
x86 |
Presentationhostdll.dll |
3.0.6920.8957 |
134,536 |
04-Aug-2023 |
00:15 |
x86 |
Reachframework.dll |
3.0.6920.8957 |
536,576 |
04-Aug-2023 |
00:15 |
x86 |
Windowsbase.dll |
3.0.6920.8957 |
1,257,472 |
04-Aug-2023 |
00:15 |
x86 |
File name |
File version |
File size |
Date |
Time |
Platform |
Presentationcore.dll |
3.0.6920.8957 |
4,006,400 |
04-Aug-2023 |
00:16 |
x64 |
Presentationfontcache.exe.config |
Not applicable |
161 |
21-Jul-2023 |
00:19 |
Not applicable |
Wpfgfx_v0300.dll |
3.0.6920.8957 |
2,259,336 |
04-Aug-2023 |
00:16 |
x64 |
System.printing.dll |
3.0.6920.8957 |
358,400 |
04-Aug-2023 |
00:16 |
x64 |
Penimc.dll |
3.0.6920.8957 |
88,984 |
04-Aug-2023 |
00:16 |
x64 |
Presentationframework.dll |
3.0.6920.8957 |
4,653,056 |
04-Aug-2023 |
00:16 |
x86 |
Presentationhostdll.dll |
3.0.6920.8957 |
175,496 |
04-Aug-2023 |
00:16 |
x64 |
Reachframework.dll |
3.0.6920.8957 |
536,576 |
04-Aug-2023 |
00:16 |
x86 |
Windowsbase.dll |
3.0.6920.8957 |
1,118,208 |
04-Aug-2023 |
00:16 |
x86 |
Presentationframework.dll |
3.0.6920.8957 |
5,296,128 |
04-Aug-2023 |
00:15 |
x86 |
Reachframework.dll |
3.0.6920.8957 |
536,576 |
04-Aug-2023 |
00:15 |
x86 |
Windowsbase.dll |
3.0.6920.8957 |
1,257,472 |
04-Aug-2023 |
00:15 |
x86 |
Presentationcore.dll |
3.0.6920.8957 |
4,222,976 |
04-Aug-2023 |
00:15 |
x86 |
Presentationfontcache.exe.config |
Not applicable |
161 |
21-Jul-2023 |
00:20 |
Not applicable |
Wpfgfx_v0300.dll |
3.0.6920.8957 |
1,741,192 |
04-Aug-2023 |
00:15 |
x86 |
System.printing.dll |
3.0.6920.8957 |
372,736 |
04-Aug-2023 |
00:15 |
x86 |
Penimc.dll |
3.0.6920.8957 |
72,112 |
04-Aug-2023 |
00:15 |
x86 |
Presentationframework.dll |
3.0.6920.8957 |
5,296,128 |
04-Aug-2023 |
00:15 |
x86 |
Presentationhostdll.dll |
3.0.6920.8957 |
134,536 |
04-Aug-2023 |
00:15 |
x86 |
Reachframework.dll |
3.0.6920.8957 |
536,576 |
04-Aug-2023 |
00:15 |
x86 |
Windowsbase.dll |
3.0.6920.8957 |
1,257,472 |
04-Aug-2023 |
00:15 |
x86 |
How to obtain help and support for this update
-
Help for installing updates: Windows Update FAQ
-
Protect yourself online and at home: Windows Security support
-
Local support according to your country: International Support