All patches are approved in our NOC monthly patch testing procedure.
- KB4343898 – 2018-08 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems
- KB4343898 – Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems
- KB4338380 – 2018-08 security Update for windows server 2008 for x86 based Systems
- KB4340937 – 2018-08 security Update for windows server 2008 for x86 based Systems
- KB4340939 – 2018-08 security Update for windows server 2008 for x86 based Systems
- KB4341832 – 2018-08 security Update for windows server 2008 for x86 based Systems
- KB4343674 – 2018-08 security Update for windows server 2008 for x86 based Systems
- KB4344104 – 2018-08 security Update for windows server 2008 for x86 based Systems
- KB4343205 – Cumulative Security Update for Internet Explorer 9 for Windows Server 2008
- KB4343900 – 2018-08 Security Monthly Quality Rollup for Windows Server 2008 R2 for x64-based Systems
- KB4343205 – Cumulation Security Update for Internet Explorer 11 for Windows server 2008 R2 x64-based systems
Impacted Products:
- Internet Explorer
- Microsoft Edge
- Microsoft Windows
- Microsoft Office and Microsoft Office Services and Web Apps
- Adobe Flash Player
- .NET Framework
- Microsoft Exchange Server
- Microsoft SQL Server
- Visual Studio
Please note the following information regarding the security updates:
- Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the Microsoft Update Catalog.
- Starting in March 2017, a delta package will be available on the Microsoft Update Catalog for Windows 10 version 1607 and newer. This delta package contains just the delta changes between the previous month and the current release.
- Updates for Windows RT 8.1 and Microsoft Office RT software are only available via Windows Update.
- For information on lifecycle and support dates for Windows 10 operating systems, please see Windows Lifecycle Facts Sheet.
- In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.
Microsoft Security Advisories:
- ADV180016 | Microsoft Guidance for Lazy FP State Restore
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180016
- ADV180018 | Microsoft Guidance to mitigate L1TF variant
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018
- ADV180020 | August 2018 Adobe Flash Security Update
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180020
Known Issues:
KB4340731, KB4340733, KB4343897, KB4343900, KB4343887
KB4343897 Applies to: Windows 10, version 1709
https://support.microsoft.com/en-us/help/4343897/windows-10-update-kb4343897
Symptoms: Some non-English platforms may display the following string in English instead of the localized language: ”Reading scheduled jobs from file is not supported in this language mode.” This error appears when you try to read the scheduled jobs you’ve created and Device Guard is enabled
Workaround: Microsoft is working on a resolution and will provide an update in an upcoming release.
KB4343900 Applies to: Windows 7 Service Pack 1Windows Server 2008 R2 Service Pack 1
https://support.microsoft.com/en-us/help/4343900/windows-7-update-kb4343900
Symptoms: There is an issue with Windows and third-party software that is related to a missing file (oem<number>.inf). Because of this issue, after you apply this update, the network interface controller will stop working.
Workaround:
- To locate the network device, launch devmgmt.msc; it may appear under Other Devices.
- To automatically rediscover the NIC and install drivers, select Scan for Hardware Changes from the Action menu.
- a. Alternatively, install the drivers for the network device by right-clicking the device and selecting Update. Then select Search automatically for updated driver software or Browse my computer for driver software.
KB4340731 Applies to: Exchange Server 2010 Enterprise Exchange Server 2013 Enterprise Exchange Server 2016 Enterprise Edition
Symptoms: When you try to manually install this security update in “normal mode” (not running the update as an administrator) and by double-clicking the update file (.msp), some files are not correctly updated. When this issue occurs, you do not receive an error message or any indication that the security update is not correctly installed. Also, Outlook Web Access (OWA) and the Exchange Control Panel (ECP) may stop working. This issue occurs on servers that are using user account control (UAC). The issue occurs because the security update does not correctly stop certain Exchange-related services.
Workaround: To avoid this issue, run the security update in elevated mode, as an administrator. To do this, right-click the update file, and then click Run as administrator.
KB4340733 Applies to: Exchange Server 2010 Enterprise
Symptoms: When you try to manually install this security update in “normal mode” (not running the update as an administrator) and by double-clicking the update file (.msp), some files are not correctly updated. When this issue occurs, you do not receive an error message or any indication that the security update is not correctly installed. Also, Outlook Web Access (OWA) and the Exchange Control Panel (ECP) may stop working. This issue occurs on servers that are using user account control (UAC).
Workaround: The issue occurs because the security update does not correctly stop certain Exchange-related services. To avoid this issue, run the security update in elevated mode, as an administrator. To do this, right-click the update file, and then click Run as administrator.
KB4343887 Applies to: Windows 10, version 1607, Windows Server 2016
https://support.microsoft.com/en-us/help/4343887/windows-10-update-kb4343887
Symptoms: This security issue has been identified in Microsoft software product that could affect your system with high CPU utilization.
Workaround: Microsoft is working on a resolution and will provide an update in an upcoming release but for the time being please avoid this patch.