Impacted Products:

Please note the following information regarding the security updates:

Known Issues:

KB5013941: Applies to: Windows 10 Enterprise 2019 LTSC; Windows 10 IoT Enterprise 2019 LTSC; Windows 10 IoT Core 2019 LTSC

https://support.microsoft.com/en-us/topic/may-10-2022-kb5013941-os-build-17763-2928-e84332a3-42bb-4d3c-9f6e-89db963230db

Improvements and fixes

This security update includes improvements that were a part of update KB5012636 (released April 21, 2022) and also addresses the following issues:

This update contains miscellaneous security improvements to internal OS functionality. No additional issues were documented for this release.

If you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device.

 

KB5013952: Applies to Windows 10, version 1607, all editions; Windows Server 2016, all editions

https://support.microsoft.com/en-us/topic/may-10-2022-kb5013952-os-build-14393-5125-0bb9f7e6-0360-4162-8eab-108e28d3a090

New! Adds improvements for servicing the Secure Boot component of Windows.

Addresses an issue that might occur when you use Netdom.exe or the Active Directory Domains and Trusts snap-in to list or modify name suffixes routing. These procedures might fail. The error message is, “Insufficient system resources exist to complete the requested service.” This issue occurs after installing the January 2022 security update on the primary domain controller emulator (PDCe).

Addresses an issue that causes the improper cleanup of Dynamic Data Exchange (DDE) objects. This prevents session teardown and causes a session to stop responding.

Addresses an issue that might cause Kerberos.dll to stop working within the Local Security Authority Subsystem Service (LSASS). This occurs when LSASS processes simultaneous Service for User (S4U) user-to-user (U2U) requests for the same client user.

Addresses a known issue that might prevent recovery discs (CD or DVD) from starting if you created them using the Backup and Restore (Windows 7) app in Control Panel. This issue occurs after installing Windows updates released January 11, 2022 or later.

Symptom

After installing updates released May 10, 2022 on domain controllers, you might see authentication failures on the server or client for some services. These services include Network Policy Server (NPS), Routing and Remote access Service (RRAS), Radius, Extensible Authentication Protocol (EAP), and Protected Extensible Authentication Protocol (PEAP). An issue has been found related to how the domain controller manages the mapping of certificates to machine accounts.

Note Installation of the May 10, 2022 updates on client Windows devices and non-domain controller Windows Servers will not cause this issue. This issue only affects servers that are used as domain controllers.

Workaround

The preferred mitigation for this issue is to manually map certificates to a machine account in Active Directory. For instructions, see Certificate mapping.

Note The instructions are the same for mapping certificates to user or machine accounts in Active Directory. If the preferred mitigation will not work in your environment, see KB5014754—Certificate-based authentication changes on Windows domain controllers for other possible mitigations in the “SChannel registry key” section.

Note Any other mitigation except the preferred mitigations might lower or disable security hardening.

KB5014026: Applies to: Windows Server 2012; Windows Embedded 8 Standard

https://support.microsoft.com/en-us/topic/kb5014026-servicing-stack-update-for-windows-10-version-1607-and-server-2016-may-10-2022-bc0ddb6d-07fb-4a24-82de-821d3c13ab62

Summary

This update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) makes sure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.

Additionally, this update adds improvements for servicing the Secure Boot component of Windows.

Important: Windows 10, version 1607 reached end of service on April 9, 2019 for devices running the Enterprise, Education, and IoT Enterprise editions. After April 9, 2019, these devices will no longer be offered servicing stack updates. To continue receiving these updates, we recommend updating to the latest version of Windows.

KB5014011: Applies to Windows Server 2012; Windows Embedded 8 Standard

https://support.microsoft.com/en-au/topic/may-10-2022-kb5014011-monthly-rollup-73d94574-c6a2-436c-b935-dc07af430dea

IMPORTANT Windows 8.1 and Windows Server 2012 R2 have reached the end of mainstream support and are now in extended support. Starting in July 2020, there will no longer be optional, non-security releases (known as “C” releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the “B” or Update Tuesday release).

For information about the various types of Windows updates, such as critical, security, driver, service packs, and so on, please see the following article. To view other notes and messages, see the Windows 8.1 and Windows Server 2012 R2

Improvements and fixes

This cumulative security update contains improvements that are part of update KB5012670 (released April 12, 2022) and includes new improvements for the following issues:

The Key Distribution Center (KDC) code incorrectly returns error message KDC_ERR_TGT_REVOKED during Domain Controller shutdown.

After installing the January 2022 Windows update or a later Windows update on the Primary Domain Controller emulator (PDCe), listing or modifying name suffixes routing by using Netdom.exe or “Active Directory Domains and Trusts” snap-in may fail and you receive the following error message: “Insufficient system resources exist to complete the requested service.”

The Primary Domain Controller (PDC) for the root domain incorrectly logs warning and error events in the System log when trying to scan outbound-only trusts.

Symptom

Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege.

After installing updates released May 10, 2022 on your domain controllers, you might see authentication failures on the server or client for services such as Network Policy Server (NPS)Routing and Remote access Service (RRAS)RadiusExtensible Authentication Protocol (EAP), and Protected Extensible Authentication Protocol (PEAP). An issue has been found related to how the mapping of certificates to machine accounts is being handled by the domain controller.

Workaround

Do one of the following:

Perform the operation from a process that has administrator privilege.

Perform the operation from a node that doesn’t have CSV ownership.

Microsoft is working on a resolution and will provide an update in an upcoming release.

The preferred mitigation for this issue is to manually map certificates to a machine account in Active Directory. For instructions, please see Certificate Mapping.

Note The instructions are the same for mapping certificates to user or machine accounts in Active Directory. If the preferred mitigation will not work in your environment, please see KB5014754—Certificate-based authentication changes on Windows domain controllers for other possible mitigations in the SChannel registry key section.

Note Any other mitigation except the preferred mitigations might lower or disable security hardening.

We are presently investigating and will provide an update in an upcoming release.