The US security agency initially advised against the installation – now they have included the Windows update for securing Active Directories from May in the catalog of known, exploited security gaps. This obliges US federal authorities to install it quickly.
The May Patchday update containing the CVE entry CVE-2022-26925 (CVSS 8.1Risk “hoch“) was intended to seal vulnerabilities in the Active Directory. Particularly explosive: the vulnerability was already being actively attacked. However, the side effect of the patch was that certificates were assigned differently to machines and accounts, which meant that registrations no longer worked correctly. CISA therefore had the update temporarily deleted from the specifications for authorities.
Corrected update – installation mandatory again
However, as of the weekend, CISA has now included bug fixes back in the catalog of security vulnerabilities that can be fixed quickly. Microsoft distributed the corrected version of the update on the June patch day, so it can now be used without side effects.
US federal agencies now have until July 22 to apply the update. A knowledgebase article is intended to help prevent possible problems in advance and provides specific instructions for installation on domain controllers. As a result, the update should first be installed on all Windows endpoints. However, before using it on domain controllers, administrators should configure two more registry keys.
CISA points out that only US federal agencies are bound by the direction to apply the security patches. However, the authority explicitly recommends that all organizations install the updates now to reduce the attack surface.
To home page
#CISA #recommends #installing #repaired #Windows #Update #Active #Directory