Microsoft Windows Security Updates May 2022 overview

Martin Brinkmann
May 10, 2022
Updated • May 10, 2022
Windows Updates
|
10

Microsoft released security and non-security updates for its Windows operating system and for other company products on the May 2022 Patch Day.

microsoft windows security updates may 2022

Updates are available for all client and server versions of Windows that Microsoft supports. These updates are already released via Windows Update and other update management products and services.  Updates are also available as direct downloads.

Our guide acts as a reference for home users and administrators. It lists important information about the updates, links to Microsoft support pages, has a list of known issues as reported by Microsoft, links to direct downloads, and a lot more.

ADVERTISEMENT

You can check out the April 2022 Patch Day overview here.

Microsoft Windows Security Updates: May 2022

The following Excel spreadsheet includes the released security updates for Windows and other company products. Just download it with a click on the following link: Windows security updates May 2022

Executive Summary

  • Microsoft released critical security updates for all supported versions of Windows.
  • Microsoft released updates for other company products, including .NET and Visual Studio, Microsoft Exchange Server, Microsoft Office, and Visual Studio and Visual Studio Code.
  • The following Windows client editions have known issues: Windows 7, Windows 8.1, Windows 10 version 1607, Windows 10 version 20H2, 21H1 and 21H2, Windows 11
  • The following Windows server editions have known issues: Windows Server 2008, Windwos Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022
  • Windows 10 version 20H2 is reaching end of servicing today.
  • Windows 10 version 1909 is also reaching end of servicing today.

Operating System Distribution

  • Windows 7 (extended support only): 27 vulnerabilities: 3 critical and 24 important
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-21972
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-23270
    • Windows Kerberos Elevation of Privilege Vulnerability -- CVE-2022-26931
  • Windows 8.1: 34 vulnerabilities: 4 critical and 30 important
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-21972
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-23270
    • Windows Kerberos Elevation of Privilege Vulnerability -- CVE-2022-26931
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-26923
  • Windows 10 version 1909: 43 vulnerabilities: 4 critical and 39 important
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-21972
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-23270
    • Windows Kerberos Elevation of Privilege Vulnerability -- CVE-2022-26931
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-26923
  • Windows 10 version 20H2, 21H1 and 21H2 : 44 vulnerabilities, 4 critical and 40 important
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-21972
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-23270
    • Windows Kerberos Elevation of Privilege Vulnerability -- CVE-2022-26931
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-26923
  • Windows 11 44 vulnerabilities, 5 critical and 39 important
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-21972
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-23270
    • Windows Kerberos Elevation of Privilege Vulnerability -- CVE-2022-26931
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-26923
    • Windows Network File System Remote Code Execution Vulnerability -- CVE-2022-26937
    • Remote Desktop Client Remote Code Execution Vulnerability -- CVE-2022-22017

Windows Server products

  • Windows Server 2008 R2 (extended support only): 28 vulnerabilities: 3 critical and 25 important
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-21972
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-23270
    • Windows Kerberos Elevation of Privilege Vulnerability -- CVE-2022-26931
  • Windows Server 2012 R2: 44 vulnerabilities: 5 critical and 39 important
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-21972
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-23270
    • Windows Kerberos Elevation of Privilege Vulnerability -- CVE-2022-26931
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-26923
    • Windows Network File System Remote Code Execution Vulnerability -- CVE-2022-26937
  • Windows Server 2016: 51 vulnerabilities: 5 critical and 46 important
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-21972
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-23270
    • Windows Kerberos Elevation of Privilege Vulnerability -- CVE-2022-26931
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-26923
    • Windows Network File System Remote Code Execution Vulnerability -- CVE-2022-26937
  • Windows Server 2019: 56 vulnerabilities: 5 critical and 51 important
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-21972
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-23270
    • Windows Kerberos Elevation of Privilege Vulnerability -- CVE-2022-26931
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-26923
    • Windows Network File System Remote Code Execution Vulnerability -- CVE-2022-26937
  • Windows Server 2022:  55 vulnerabilities: 6 critical and 49 important
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-21972
    • Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability -- CVE-2022-23270
    • Windows Kerberos Elevation of Privilege Vulnerability -- CVE-2022-26931
    • Active Directory Domain Services Elevation of Privilege Vulnerability -- CVE-2022-26923
    • Windows Network File System Remote Code Execution Vulnerability -- CVE-2022-26937
    • Remote Desktop Client Remote Code Execution Vulnerability -- CVE-2022-22017

Windows Security Updates

Windows 7 SP1 and Windows Server 2008 R2

Updates and improvements:

  • Fixed an incorrectly returned error message (KDC_ERR_TGT_REVOKED) during Domain Controller shutdown (Key Distribution Center (KDC))
  • Fixed the incorrect logging of warning and error events in the System log when trying to scan outbound-only trusts (Primary Domain Controller).
  • Fixed error message "Insufficient system resources exist to complete the requested service" after installing the January 2022 or later Windows Updates. (Monthly-rollup only)

Windows 8.1 and Windows Server 2012 R2

Updates and improvements:

  • Fixed an incorrectly returned error message (KDC_ERR_TGT_REVOKED) during Domain Controller shutdown (Key Distribution Center (KDC))
  • Fixed the incorrect logging of warning and error events in the System log when trying to scan outbound-only trusts (Primary Domain Controller).
  • Fixed error message "Insufficient system resources exist to complete the requested service" after installing the January 2022 or later Windows Updates. (Monthly-rollup only)

Windows 10 version 20H2, 21H1 and 21H2

  • Security updates
  • Plus the updates introduced in the preview update of April 25, 2022.
Summary
Microsoft Windows Security Updates May 2022 overview
Article Name
Microsoft Windows Security Updates May 2022 overview
Description
Microsoft released security and non-security updates for its Windows operating system and for other company products on the May 2022 Patch Day.
Author
Publisher
Ghacks Technology News
Logo
Advertisement

Previous Post: «
Next Post: «

Comments

  1. ilev said on May 10, 2022 at 8:38 pm
    Reply

    Last updates for 1909 (all versions) and 20H2

    1. Anonymous said on May 10, 2022 at 9:26 pm
      Reply

      If hardware supports it, Windows 11 isn’t too bad an upgrade after your finish tweaking and remove the crap Microsoft thinks everybody should use but, wait until the first week of next month just in case there’s a bug in the updates.

  2. TelV said on May 10, 2022 at 8:52 pm
    Reply

    Link to KB5014001 for Windows 8.1 (to save you looking for it) https://www.catalog.update.microsoft.com/Search.aspx?q=5014001

  3. ECJ said on May 10, 2022 at 9:46 pm
    Reply

    Any further details about CVE-2022-29127 (BitLocker Security Feature Bypass Vulnerability).

    https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-29127

    “A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to a powered off system could exploit this vulnerability to gain access to encrypted data.”

  4. Mothy said on May 11, 2022 at 1:05 am
    Reply

    No issues to report on two Windows 8.1 Pro systems.

    After taking a Macrium image of the system, installed the Servicing Stack Update first (KB5014025) downloaded from the Microsoft Catalog. Then via Windows Update installed the Monthly Rollup (KB5014011) and Security and Quality Rollup for .NET Framework 3.5, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 8.1 for x64 (KB5013872).

  5. Anonymous said on May 11, 2022 at 2:26 am
    Reply

    No issues on Windows 7 ESU.

  6. fist of noodles said on May 11, 2022 at 2:48 am
    Reply

    Windows, in it’s various versions, always seems to be carrying tons of “Remote Code Execution Vulnerability” bugs/patches.

    I guess it’s true what they say about Windows: Backdoors are only found when people report them.

  7. Anonymous said on May 12, 2022 at 4:53 am
    Reply

    The update caused a bug in my Windows 10 client on vmware Workstation 16.2.3 (on Linux host). The upper left of the screen (which can be the whole screen or majority of the screen) does not display correctly.

  8. Anonymous said on May 24, 2022 at 5:02 pm
    Reply

    There is no Known Issues section in this article like there normally is.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.