We’re in for a hum-dinger of a Patch Tuesday today, with knowledgeable folks anticipating a big, scary new Windows exploit and a ‘Softie Captain Ameri
[See the full post at: January 2020 Patch Tuesday running commentary, from the skeptic’s corner]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
January 2020 Patch Tuesday running commentary, from the skeptic’s corner
Home » Forums » Newsletter and Homepage topics » January 2020 Patch Tuesday running commentary, from the skeptic’s corner
- This topic has 167 replies, 50 voices, and was last updated 3 years, 10 months ago.
AuthorTopicwoody
ManagerViewing 64 reply threadsAuthorReplies-
GoneToPlaid
AskWoody Lounger -
jabeattyauditor
AskWoody Lounger
-
le_clandestin
AskWoody Plus-
woody
Manager
anonymous
GuestFrom some of the articles running on Forbes there appears to be some scare tactics at play even regarding 7 and some wav sound file crypto reporting as well as the fact that Windows 7 is getting one last round of updates for Jan 14(today) before it’s all over.
Now for Windows 7 patches in Feb 2020 that’s when it’s really not getting any new security patches(For Consumers at least). I’m beginning to suspect that MS is embarrassed by missing that 1 Billion devices number goal that’s still to this day at around 900 million for 10. So those scare tactics is why there needs to be DEFCON3 or higher before I’ll even think about it.
That Sky Is Falling theme is definitely in play today at 7’s EOL but that’s still not going to help any 1 Billion devices goal from being met on 10. People are just not limited to only PCs/Laptops for any light computing needs so Phones/Tablets for video/browsing and other light computer needs sees more devices running Android and iOS filling that need.
-
woody
Manager
anonymous
Guest-
warrenrumak
AskWoody Lounger -
abbodi86
AskWoody_MVP
-
Mr. Natural
AskWoody Lounger-
Mr. Natural
AskWoody Lounger
JCpharm
AskWoody Plus-
PKCano
Manager -
Mr. Natural
AskWoody Lounger
-
b
AskWoody_MVPM$ should have an incentive i.e. (big fine) to make sure exploits of this level are not passed on to contractors and paying customers of their OS.
And Ford should be fined each time they have to recall a dangerous part. But they’re not.
-
DLivesInTexas
AskWoody Plus -
b
AskWoody_MVP -
DLivesInTexas
AskWoody PlusPerhaps this apples-to-oranges comparison of Microsoft and Ford would be more appropriate if Ford refused to allow anyone to drive their cars unless they agree to an EULA that absolves Ford of any damage caused by the use of their product.
1 user thanked author for this post.
-
-
LoneWolf
AskWoody LoungerUntil patch release and until analysis, I treat the prophecies of doom with exactly what they’re due.
We are SysAdmins.
We walk in the wiring closets no others will enter.
We stand on the bridge, and no malware may pass.
We engage in support, we do not retreat.
We live for the LAN.
We die for the LAN.4 users thanked author for this post.
techweenie
AskWoody LoungerAfter reading the article, I got the “boy who cried wolf” impression. Woody, it seems like you’re starting to become pacified to all the threats. Just because nothing has materialized with recent threats, doesn’t mean something won’t with each new one. I definitely agree we should wait to see if any bugs are introduced, but don’t start making us believe there’s no urgency until proven that there really is no urgency.
1 user thanked author for this post.
-
woody
ManagerWell, OK, but I’d put the shoe on the other foot.
Don’t patch until there’s a lot of evidence that you need to patch.
It’s a half-full/half-empty sort of thing. But given MS’s horrible track record with botched patches, I’d say the burden of proof is on MS.
Total of 23 users thanked author for this post. Here are last 20 listed.
-
bbearren
AskWoody MVPFor me, the evidence that there is a need to patch is the fact that a patch has been made available. I much prefer being the one who says, “Patches installed, no issues, no problems, no BSOD’s, no black screens” than the one who says, “Help! The hackers got my PC!”
As for “given MS’s horrible track record with botched patches, I’d say the burden of proof is on MS.” I’ve had no botched patches, and I have installed every patch that has been offered to my systems from Windows 7 all the way through Windows Version 1909 (OS Build 18.363.592).
In the event that I should one day become botched by a patch, I’m six minutes away from being un-botched.
Always create a fresh drive image before making system changes/Windows updates; you may need to start over!We were all once "Average Users". We all have our own reasons for doing the things that we do with our systems, we don't need anyone's approval, and we don't all have to do the same things. -
Cybertooth
AskWoody PlusIn the system where it took you six minutes to install the OS image, are you using an SSD, how large is the image, and how often do you make fresh images?
-
bbearren
AskWoody MVPThe PC is a dual boot with 6 drives, 4 of which are SSD’s (three 250GB, one 1TB), two are 1TB SSHD’s. The OS partition is 100GB, the image file is 38.3GB located on the 1TB SSD.
However, don’t be deceived by the “SSD’s”. I had similar performance (~six minute restoration) when I had four spinners in the box. The partition size is the primary contributor to the speed boost. I’ve been doing this for years and years.
Task Scheduler runs Image For Windows scripts for my OS partition, my Program Files partition and my Users partition (they’re all 100GB partitions) in the wee hours every Sunday morning while I sleep. Task Scheduler also runs a Robocopy batch file twice daily to copy my Documents folder to my OneDrive folder. There it’s synced through the cloud to my NAS OneDrive folder. That way, any data in between drive images is already saved in three separate locations.
I do the same for the B side of my dual boot.
Always create a fresh drive image before making system changes/Windows updates; you may need to start over!We were all once "Average Users". We all have our own reasons for doing the things that we do with our systems, we don't need anyone's approval, and we don't all have to do the same things.-
This reply was modified 3 years, 10 months ago by
bbearren.
-
This reply was modified 3 years, 10 months ago by
bbearren.
2 users thanked author for this post.
-
This reply was modified 3 years, 10 months ago by
-
-
-
Kranium
AskWoody LoungerI, too, go by my own anecdotal evidence.
Group B for WIN7 w/ ESU, plus trying out Linux builds in dual boot.
2 users thanked author for this post.
-
woody
Manager
-
-
-
Schnarph
AskWoody LoungerAt the time of your post, my main PC was on 1809. I made 2 backups then upgraded to 1909, all patches and fully up to date. Everything seems to be running fine, actually a little better in some respects. However, if I let MS update my drivers this system will not function.
Being fully up to date on patches is one thing, but up to date with drivers is another. In my case and likely most cases this is the hardware manufacturers fault, but MS pushing those bad drivers is not acceptable.
Win7and10
AskWoody LoungerI have not installed the Windows 7 December 2019 Monthly Quality and Security Rollup yet for that reason. Somehow I can’t bring myself to do it knowing that I have to cancel the nag screen. Curious to see what happens on 1/15/20.
My Win 10 is totally patched.
Win 10 Home 22H2
-
This reply was modified 3 years, 10 months ago by
Win7and10.
-
Seff
AskWoody Plus -
PaulK
AskWoody Lounger -
Charlie
AskWoody PlusI’ve got both of the EOSNotify and EOSNotify2 tasks disabled in Task Scheduler. It was not a big deal for me to disable them. EOSNotify2 has its start date shown as Jan. 15, 2020 at 12:00 pm. If by chance I do still see a Nag screen, I’ll go back and delete the tasks altogether, and maybe even move the EOSNotify.exe program in System32 to the Recycle Bin.
Have you seen the price of Tums? It's enough to give you heartburn. -
Win7and10
AskWoody LoungerDid the same, went right to the task scheduler and disabled the TWO EOS Notify tasks after the installation of the December KB 4530734 ROLLUP. Found them under SETUP in the TASK SCHEDULER and also checked the active tasks and EOS NOTIFY is no longer in the active tasks. Tomorrow evening will sign on to see if the task is really gone. From what I can see it appears so! Let us know and thanks!
Win 10 Home 22H2
-
This reply was modified 3 years, 10 months ago by
Win7and10.
1 user thanked author for this post.
-
This reply was modified 3 years, 10 months ago by
-
jabeattyauditor
AskWoody LoungerSeff
AskWoody PlusI should really have put a bet on at the local bookmakers, predicting that there would be a doomsday threat on EOL day for Windows 7 – it was totally predictable, whether real or imagined. Yes we have to take such things seriously, but that doesn’t mean we have to panic.
2 users thanked author for this post.
anonymous
GuestI am using Windows 7 and just received 4 updates: KB4535102 Security and Quality Rollup, KB4534310 Security Monthly Quality Rollup, KB4503548 .NET Framework 4.8 and KB890830 Malicious Software Removal Tool. I only have beginner computer skills so I will watch this site to see what the verdict is on whether I should install, but am wondering if they will be available for installation after today?
-
PKCano
Manager -
Seff
AskWoody PlusAgreed. The important thing to note is that Microsoft aren’t immediately withdrawing existing patches, they just aren’t routinely releasing any new ones – although the likelihood is that they will respond to any real nightmare scenario as they will have patches available in those circumstances for paying business customers and will be under enormous pressure to extend them to everyone given the high residual usage of Windows 7 – as they have done previously with XP patches long after EOL.
-
Cybertooth
AskWoody PlusWe can confidently state that this month’s updates will still be available for installation after today. For one thing, not everyone (not even those caught in the Windows 10 matrix) installs the month’s patches on the same day that they’re released; taking down patches the day after release would cut off untold millions of users. And for another, patches for End of Support versions of Windows such as XP and Vista are still available today, and if you were to install these old operating systems new this afternoon, the patches for them would still show up in Windows Updates.
At some point, that will no longer be the case–for example, you can’t download updates for Windows 98 any more. But if history is any indication, Windows 7 updates will remain available for years.
PKCano
ManagerGroup B Security-only Updates and the IE11 Cumulative Update have been updated for January 2020 on AKB2000003.
There is a new SSU for Win7. KB4536952 32-bit ot 64-bit
The documentation for the SSU DOES NOT mention the ESU or say it is just for the ESU.-
Microfix
AskWoody MVP -
PKCano
Manager -
abbodi86
AskWoody_MVPWhen did they ever list the real changes? 🙂
BTW, both Monthly Rollup KB4534310 and Security Only KB4534314 contain updated WUA client, which they didn’t mention in the articles
on another hand, ESU licenses are updated to officially support these editions:
Enterprise,EnterpriseE,EnterpriseN,Professional,ProfessionalE,ProfessionalN,Ultimate,UltimateE,UltimateN1 user thanked author for this post.
-
-
-
Charlie
AskWoody Plus -
AmbularD
AskWoody PlusPurely speculation here, but MS did release some unplanned emergency patches for major threats for Windows XP after EOL. Maybe this SSU is intended to prepare for any such emergency patches for Windows 7.
i7-10700k - ASROCK Z590 Pro4 - 1TB 970 EVO Plus M.2 - DDR4 3200 x 32GB - GeForce RTX 3060 Ti FTW - Windows 10 Pro
-
abbodi86
AskWoody_MVP -
Charlie
AskWoody Plus -
PKCano
Manager -
Charlie
AskWoody Plus -
PKCano
Manager -
AmbularD
AskWoody PlusI’m aware, I just mean, perhaps the purpose of the SSU is to make certain that the machine will be able to receive and install any future emergency patches which might be issued.
i7-10700k - ASROCK Z590 Pro4 - 1TB 970 EVO Plus M.2 - DDR4 3200 x 32GB - GeForce RTX 3060 Ti FTW - Windows 10 Pro
1 user thanked author for this post.
-
abbodi86
AskWoody_MVP -
Charlie
AskWoody PlusFrom Google:
Secure Hash Algorithms, also known as SHA, are a family of cryptographic functions designed to keep data secured. It works by transforming the data using a hash function: an algorithm that consists of bitwise operations, modular additions, and compression functions.
I must have misunderstood.
Have you seen the price of Tums? It's enough to give you heartburn.1 user thanked author for this post.
-
jabeattyauditor
AskWoody LoungerYou didn’t completely misunderstand.
A recent SSU enabled the application of updates signed only with SHA-2; this update was made necessary by the cracking of SHA-1 and by Microsoft moving to SHA-2-only code signing.
So… to make a short story long, you had to apply the SSU to enable the more-securely-signed updates to make your system more secure.
🙂
1 user thanked author for this post.
-
Charlie
AskWoody PlusThank you, that’s exactly the way I understood it, I don’t understand why we’ve had SSU’s each and every month since Sept. and the headaches they’ve caused people as to what order, whether installed before or after the main updates, etc. Now we have another one for Jan.
Anyway, for the most part, we got through it, it’s not imperative that I understand everything, and as usual I’m very thankful for the information that I get from Woody and the crew here on this site.
🙂
Have you seen the price of Tums? It's enough to give you heartburn.
-
-
bbearren
AskWoody MVPSeeker/cannon fodder report:
KB4532938 Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 1909 for x64
KB4528760 Cumulative Update for Windows 10 Version 1909 for x64-based Systems
KB890830 Windows Malicious Software Removal Tool x64Restart required/accomplished. So far, so good.
Always create a fresh drive image before making system changes/Windows updates; you may need to start over!We were all once "Average Users". We all have our own reasons for doing the things that we do with our systems, we don't need anyone's approval, and we don't all have to do the same things.-
anonymous
Guest -
JCpharm
AskWoody PlusKB4532938 Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 1909 for x64
KB4528760 Cumulative Update for Windows 10 Version 1909 for x64-based Systems
KB890830 Windows Malicious Software Removal Tool x64Same updates for me as well. Hiding for now.
Win10 Pro
-
This reply was modified 3 years, 10 months ago by
JCpharm.
-
This reply was modified 3 years, 10 months ago by
Alex5723
AskWoody PlusWe’re in for a hum-dinger of a Patch Tuesday today, with knowledgeable folks anticipating a big, scary new Windows exploit and a ‘Softie Captain Ameri
[See the full post at: January 2020 Patch Tuesday running commentary, from the skeptic’s corner]Martin Brinkmann has the full breakdown :
Lars220
AskWoody PlusReminder for Windows 7 users, the full screen notificaton starts tomorrow, from:
https://support.microsoft.com/en-us/help/4534310
January 14, 2020—KB4534310 (Monthly Rollup)
IMPORTANT Starting on January 15, 2020, a full-screen notification will appear that describes the risk of continuing to use Windows 7 Service Pack 1 after it reaches end of support on January 14, 2020. The notification will remain on the screen until you interact with it. This notification will only appear on the following editions of Windows 7 Service Pack 1:
Two WiFi engineers got married. The reception was fantastic.5 users thanked author for this post.
anonymous
GuestRead your guidance to turn off updates this morning in New Zealand where it’s already Wednesday and realize that I may be too late to protect myself [running Win8.1] –
From Windows Update in Control Panel
” ! Download and install updates (550.9 MB total)
3 important updates are available
4 optional updates are available”
I’m given the option to install updates, but it is clear as mud whether they’ve already been downloaded and need to be installed, or clicking to install will commence the download.I did turn off automatic updates. So, am I safe? Or have I been drafted to be a lab rat?
Thanks,
A7-
Microfix
AskWoody MVP -
anonymous
Guest
anonymous
GuestValter
AskWoody Loungersamak
AskWoody PlusAccording to MS, the big, scary vulnerability only affects Windows 10 and Server, not W7 / 8
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601
Yay, Windows 10 , most secure Windows ever 😉
Windows 10 Home 22H2, Acer Aspire TC-1660 desktop + LibreOffice, non-techie
7 users thanked author for this post.
Win7and10
AskWoody Lounger-
PKCano
Manager -
fernlady
AskWoody LoungerI haven’t updated yet cause the updates won’t be available to me till tomorrow morning but I did find the EOSNotify and EOSNotify2 in task scheduler and I disabled both of them. Hope I didn’t kill my computer.
I just went back in to task scheduler to look at them again and they have disappeared from the lineup. oh oh
Edition Windows 11 Pro
Version 23H2
Installed on 10/19/2022
OS build 22631.27151 user thanked author for this post.
-
krzemien
AskWoody Loungeranonymous
GuestI’ve updated a number of non-critical/test or still disposable pre-production systems so far. 1809 & 1909 Win 10, LTSC 2019, Server 2016, and Server 2019. I have a few of my techs running it on their office PCs too because I like making them guinea pigs. No issues have come to light yet.
I plan to sit in a holding pattern like this waiting for issues to surface unless word comes out about active exploits.
OscarCP
MemberThere is nothing in gHacks about this vulnerability, at this time. (3:13 PM, EST) Only two garden variety CVEs, one about a remote desktop attack and one about an exploit that makes IE11 vulnerable to a phishing attack, where the user is bamboozled, as usual, to click something that should not be clicked.
However, the story so far, as I can ascertain it, is thus: at NSA they found this vulnerability and then alerted MS about it. Ms, on receiving the notice from the super-spooks, took quick action, and here we are.
As evidence for this story, there is this document, directly from Spook Central:
https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF
Notice that, in the first two paragraphs it says that this CVE affects (only?) Windows 10 and Server 216/219:
“NSA has discovered a critical vulnerability (CVE-2020-0601) affecting Microsoft Windows cryptographic functionality. The certificate validation vulnerability allows an attacker to undermine how Windows verifies cryptographic trust and can enable remote code execution. The vulnerability affects Windows 10 and Windows Server 2016/2019 as well as applications that rely on Windows for trust functionality. Exploitation of the vulnerability allows attackers to defeat trusted network connections and deliver executable ode while appearing as legitimately trusted entities. Examples where validation of trust may be impacted include:
HTTPS connections
Signed files and emails
Signed executable code launched as user-mode processes
The vulnerability places Windows endpoints at risk to a broad range of exploitation vectors.
NSA assesses the vulnerability to be severe and that sophisticated cyber actors will understand the underlying flaw very quickly and, if exploited, would render the previously mentioned platforms as fundamentally vulnerable.”As to scaremongering and the Boy That Cried Wolf (too many times):
The boy cried “Wolf” around his village, a place and a time when wolves were a real problem, because they used to come in big packs and kill and eat its inhabitants. So crying “wolf” was serious business that got the boy a lot of attention. He liked that, and so he kept crying “wolf” with no real wolves in sight. After he did it three times, people decided to ignore him and stop wasting time following the alarms from a proven purveyor of fake alarms.
Until, one day, the wolves really came, they killed and ate everybody in the village, except for the boy and his family. Because Dad had kept, “just in case the boy was not lying, for a change”, his trusty MP-15 well greased, cleaned and loaded, set for “burst” firing (those were the days!) and always close at hand.
Moral of this story: Don’t worry about sudden, alarming news of fierce bugs out there to get people (even if the news come from people close to you, or usually trusted — not the same thing, obviously) but keep the patches handy. Don’t rush to install them, though, but wait — as usual — for indications that they are themselves bug-free, then install them.
And this being my last Patch Tuesday ever (as Win 7 is my last and only Windows for evermore), all I can say is: Wow! What a way to go!
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV3 users thanked author for this post.
-
b
AskWoody_MVP -
OscarCP
MemberSo now you know.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV1 user thanked author for this post.
-
CraigS26
AskWoody Plus-
woody
Manager -
bbearren
AskWoody MVPI forgot about that one (I don’t use Search) so I just checked. Still have to use Ctrl + V to paste in the search box, but search still works. It’s slow for me because I have indexing disabled, but it does indeed work.
Always create a fresh drive image before making system changes/Windows updates; you may need to start over!We were all once "Average Users". We all have our own reasons for doing the things that we do with our systems, we don't need anyone's approval, and we don't all have to do the same things. -
anonymous
Guest
-
Kranium
AskWoody LoungerThis vulnerability exists in Windows 7, too. It probably has been there since Windows 2000.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601
Thus far, Win 7 is not on the list.
Group B for WIN7 w/ ESU, plus trying out Linux builds in dual boot.
-
warrenrumak
AskWoody LoungerShoot, you’re right. I was getting my lists crossed with the one security vulnerability actually marked as “critical” this month, which is the RDP vulnerability.
Someone’s going to need to explain to me why the certificate spoofing vulnerability has an “important” rating, not critical.
4 users thanked author for this post.
bbearren
AskWoody MVP>>edited for clarity<<
The same updates were pushed to my Dell Latitude E5420. That is to say more specifically, when I logged in and went to All settings > Update & Security the announcement that there are updates available for download was at the top of the page, followed by the list of available downloads, and below that the prominent “Download” button. I had to click the button to initiate the download and update process. No issues with my laptop.
>>end of edit<<
The same updates are being restarted/installed on my NAS as I type this.
All is well. I haven’t updated the B side of my laptop yet, but I’ll get around to that one soon enough. Four out of five installations updated with no issues.
Always create a fresh drive image before making system changes/Windows updates; you may need to start over!We were all once "Average Users". We all have our own reasons for doing the things that we do with our systems, we don't need anyone's approval, and we don't all have to do the same things._Reassigned Account
AskWoody LoungerWindows so popular and no doubt full of old code that dates back to Windows NT. Microsoft will always be chasing these security holes. Not much difference between a Mac OS, or Linux they too have old code just waiting to be found. Except that those operating systems do not have nearly the numbers of potential exposed users as Windows does.
Ken Sims
AskWoody PlusWrite-up by the SANS Internet Storm Center about Patch Tuesday, especially CVE-2020-0601:
Microsoft Patch Tuesday for January 2020Their summary chart shows that Microsoft only rates CVE-2020-0601 as Important, not Critical.
1 user thanked author for this post.
-
b
AskWoody_MVPPhishing/ransomware appears to be the most likely attack vector for CVE-2020-0601:
How could this flaw be exploited? Let’s look at a quick sample scenario how this flaw could be used to trick a user to install malicious code:
1. The attacker sends an email to the user. The attacker can use this flaw to create a valid signature for the email indicating that it came from a trusted source (for example a vendor).
2. The user clicks on the link, and the attacker will redirect the request to a malicious website via a man in the middle attack. The attacker would be able to create a fake website with a TLS certificate that appears to be valid.
3. Malicious software will be downloaded from the site. The attacker will be able to create a valid code signing signature.
4. The user, or endpoint protection software on the user’s system, will consider the software harmless due to the (fake) signature identifying a trusted vendor as the author.
…
This flaw is likely going to affect a lot of third party software as well, not just software written by Microsoft. Any software calling the “CertGetCertificateChain()” function in Crypto API should be considered vulnerable, which for example includes Google Chrome and many others. -
OscarCP
MemberIn the (USA) National Security Agency (NSA) document I posted a link to in an earlier comment and also copied what I understood to be the most immediately informative text from the first and second paragraph, among other things it does say;
“Examples where validation of trust may be impacted include:
HTTPS connections
Signed files and emails
Signed executable code launched as user-mode processes
The vulnerability places Windows endpoints at risk to a broad range of exploitation vectors.“
So, I do wonder: what other kinds of attacks could there be, particularly for “consumer” users, such as many of us here, besides phishing and, or ransomware?
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV
-
abbodi86
AskWoody_MVPWhile the blog post don’t mention it clearly, but .NET 4.8 got refreshed packages for all Windows versions, in addition to the Security Rollup
https://devblogs.microsoft.com/dotnet/net-framework-january-security-and-quality-rollup/
Ken Sims
AskWoody PlusHere’s an article by Ars Technica where they recommend patching right away:
Patch Windows 10 and Server now because certificate validation is brokenOne paragraph from the article:
Microsoft has rated the update as “important” rather than critical. But in a blog post, Mechele Gruhn, the Principal Security Program Manager for Microsoft Security Response Center, explained that this was because “we have not seen it used in active attacks.”
Personally I’m not going to rush into patching. At the very least I want see credible reports of proof-of-concept exploits before expediting patching.
WildBill
AskWoody PlusI know Java is bad news now but Just in Case… I noticed your Oracle link also went to the VMWare page. On http://www.oracle.com, I searched “Any updates for Java?”. The last SE Critical Patch Update Advisory was October 2012. SE 13 (JDK 13) was released October 2019. Guess we’re cool…
Bought a refurbished Windows 10 64-bit, currently updated to 22H2. Have broke the AC adapter cord going to the 8.1 machine, but before that, coaxed it into charging. Need to buy new adapter if wish to continue using it.
Wild Bill Rides Again...-
AJNorth
AskWoody PlusHello WB,
For those who are running the Java SE Runtime Environment (as am I, due to the requirement of one of my banks), then the JRE has been updated to version 8u241 (digitally signed on 2019.12.11):
https://www.oracle.com/technetwork/java/javase/downloads/jre8-downloads-2133155.html
Cheers,
AJN
2 users thanked author for this post.
Win7and10
AskWoody LoungerHere’s what I received today:
WINDOWS 7
KB4535102 2020-01 Security Quality Rollup for .NET
KB4534310 2020-01 Security Monthly Quality Rollup
KB4503548 Microsoft NET Framework for Windows 7 for x 64
KB890830 Windows Malicious Software Removal Tool x 64 January 2020HID THEM ALL FOR NOW…..THEN…DRUM ROLL….
Received :
KB4536952 2020-01 Servicing Stack Update for Windows 7 for x 64 based systemsHID THAT AS WELL…..
Waiting for Defcon Safe…..QUESTION: I did not install the December 2109 .NET Security and Quality Rollup, it stated Recommended. Will that be an issue and would you install it before any of the January updates?
Thanks….Wonder Woman Cape in Place…. 🙂
Win 10 Home 22H2
-
PKCano
ManagerKB4503548 Microsoft NET Framework 4.8 for Windows 7 for x 64 is the INSTALLER for .NET 4.8. We have not been recommending it for Win7. I would suggest leaving it hidden.
If December 2019 .NET Security and Quality Rollup is CHECKED, I would recommend installing it after you unhide it. If it is UNCHECKED, do not check it and it won’t get installed, But you should rehide it so you get the SSU KB4536952. All the checked updates in the queue can be installed at once, providing they have the DEFCON approval.
3 users thanked author for this post.
-
ryegrass
AskWoody Lounger -
Win7and10
AskWoody LoungerThanks PKano,
Will not install the 4.8 per your recommendation.
(KB4503548 Microsoft NET Framework 4.8 for Windows 7 for x 64 is the INSTALLER for .NET 4.8. We have not been recommending it for Win7. I would suggest leaving it hidden.)In regards to the December 2109 .NET Security and Quality Rollup, it stated Recommended, and it was checked on the initial WU in December. I hid it, and did not install, only the December 2019 Rollup. I have installed the .NET Security and Quality Rollups in the past as they were mostly all recommended.
Since WIN 7 is EOL, I presume I should UNHIDE it and install it before Defcon levels are approved for the January updates, correct?
Thanks again!
Win 10 Home 22H2
-
Paul T
AskWoody MVPWin7 EOL doesn’t make any difference.
You should have installed the December updates last week, but as we are now in the January patch cycle I would wait to see what is recommended before installing any updates.And you should have an image backup of your machine, as always.
cheers, Paul
-
-
-
Nibbled To Death By Ducks
AskWoody PlusKB4503548 Microsoft NET Framework 4.8 for Windows 7 for x 64 is the INSTALLER for .NET 4.8. We have not been recommending it for Win7. I would suggest leaving it hidden.
I don’t have 4.8 on my system per advice, will the .Net rollup KB4535102 just go ahead and update all .NET frameworks to 4.7 and not become upset there is no 4.8 on my system?
Win7 Pro SP1 64-bit, Dell Latitude E6330, Intel CORE i5 "Ivy Bridge", 12GB RAM, Group "0Patch", Multiple Air-Gapped backup drives in different locations. Linux Mint Greenhorn
--
"Nine out of 10 doctors say Acid Reflux is mainly caused by computers." -
PKCano
ManagerThe Rollup is a bundle of independent patches for each separate version of .NET. If you do not have the version of .NET installed, the patch for that version is not applied. The Rollup installation manages patching only the individual version(s) you have installed.
1 user thanked author for this post.
-
Nibbled To Death By Ducks
AskWoody PlusThanks, PKCano. I thought that was the way of things, just needed to double-check; this flu has really smacked me hard, and am a little fuzzy around the edges. (Got my shot too.) 🙁
Win7 Pro SP1 64-bit, Dell Latitude E6330, Intel CORE i5 "Ivy Bridge", 12GB RAM, Group "0Patch", Multiple Air-Gapped backup drives in different locations. Linux Mint Greenhorn
--
"Nine out of 10 doctors say Acid Reflux is mainly caused by computers."
-
-
RetiredGeek
AskWoody MVP-
RetiredGeek
AskWoody MVPHey Y’all,
Now 3 days in on my Test machine w/o issue. I’ve also decided to install on my main desktop and am 2 days in with that and also no problemo! HTH 😎
1 user thanked author for this post.
-
RetiredGeek
AskWoody MVPHey Y’all,
I said I’d keep you updated so here it is. Over the last two days I’ve noticed that my machine will no longer wake from sleep. This used to take a light tap on the power button but this now restarts the machine!
So I decided to restore my C: partition from my Macrium Reflect backup on my H: drive (3rd physical drive {SSD} in the machine. Guess what the Reflect rescue media only recognizes the firs 2 drives C: & G:, although when booted into Windows it sees them. The really funny part is it sees them for purposes of backup but not restore and it happens in V6 & V7.
Well back to the topic, I copied the backup file to the G: drive and restored it successfully and the machine once again behaves like it used to. So there is something in the cumulative updates causing the problem.
In the process of trouble shooting this problem I also noticed that options for turning off Fast Start are no longer in the Power Options menus in 1909.
HTH 😎
1 user thanked author for this post.
-
b
AskWoody_MVPIn the process of trouble shooting this problem I also noticed that options for turning off Fast Start are no longer in the Power Options menus in 1909.
It’s still there in the usual place: Turn On or Off Fast Startup in Windows 10
-
Ken Sims
AskWoody PlusAn article from Brian Krebs about Patch Tuesday:
Patch Tuesday, January 2020 EditionHe doesn’t make an explicit recommendation about how quickly to apply patches, but he does say (in reference to CVE-2020-0601):
Both Green and White said it likely will be a matter of hours or days before security researchers and/or bad guys work out ways to exploit this bug, given the stakes involved. Indeed, already this evening KrebsOnSecurity has seen indications that people are teasing out such methods, which will likely be posted publicly online soon.
… which is kind of an implied recommendation to patch fairly quickly.
anonymous
Guestanonymous
GuestNibbled To Death By Ducks
AskWoody PlusJust checked and saw:
2020-01 Security and Quality Rollup for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 7 and Server 2008 R2 for x64 (KB4535102)
2020-01 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4534310)
Windows Malicious Software Removal Tool x64 – January 2020 (KB890830)
<hr />
All labelled “Important”, installed none. Sitting in foxhole for now. Relieved to see that only Win 10 is affected by The Big Whambo.
—
(Sidenote: “Sometimes being a version back from the latest OS is a good thing,” we said in Ye Olde Days of Windows….remembering ME, 2000, Vista, 8.0,…DOS was fairly well behaved by the last version… 6.22?…(chuckle)_oh, the fond memories of debugging ’til 4 AM sessions…)
Thanks to all the Lighthouses on here who keep us off the rocks!
—
Win7 Pro SP1 64-bit, Dell Latitude E6330, Intel CORE i5 "Ivy Bridge", 12GB RAM, Group "0Patch", Multiple Air-Gapped backup drives in different locations. Linux Mint Greenhorn
--
"Nine out of 10 doctors say Acid Reflux is mainly caused by computers."PerthMike
AskWoody PlusAustralian govt is recommending patching all three issues right away, jumping on the hype wagon.
No matter where you go, there you are.
-
doriel
AskWoody LoungerCzech goverment… Czech government just does not have a clue what is going on. Honestly I checked our National Center of Cyber Security web and the last update is dated to 9.12.2019 🙂 No politics here, but you get my point.
NCKBDell Latitude 3420, Intel Core i7 @ 2.8 GHz, 16GB RAM, W10 22H2 Enterprise
HAL3000, AMD Athlon 200GE @ 3,4 GHz, 8GB RAM, Fedora 29
PRUSA i3 MK3S+
1 user thanked author for this post.
Alex5723
AskWoody PlusIn the event that I should one day become botched by a patch, I’m six minutes away from being un-botched.
How many of the 2 billion Windows users would you guess are ‘six minutes away from being un-botched’ ? I would say ~20%
How many will pay hundred$$ in order to fix their botched Windows PCs after an Windows Update ?
I would say ~80%-
bbearren
AskWoody MVPHow many of the 2 billion Windows users would you guess are ‘six minutes away from being un-botched’ ? I would say ~20% How many will pay hundred$$ in order to fix their botched Windows PCs after an Windows Update ? I would say ~80%
And there’s the rub. Instead of spending time and effort month after month after month trying to dodge updates, setting up a conscientious, regular drive image regimen is a once-and-done procedure. It is no more complex (perhaps less so) than going through various settings in the registry, group policy, etc. to postpone updates.
Any drive imaging software that supports command line input can be setup in Task Scheduler to perform in the background and create drive images regularly.
As for how many will pay hundreds of $$$ in order to fix their botched Windows PCs, in view of the complete absence of any evidence of a pandemic of botched PCs by Windows updates, that percentage is most certainly not ~80%. It’s far more likely to be >0.01%. If the recent CVE-2020-0601 vulnerability made such a splash in the news, one might think that hundreds of millions of PCs suddenly being borked by a Windows update would prompt a few articles.
As I posted here, it’s just not that big an issue for ordinary home users with home networks. The sky is not falling.
Always create a fresh drive image before making system changes/Windows updates; you may need to start over!We were all once "Average Users". We all have our own reasons for doing the things that we do with our systems, we don't need anyone's approval, and we don't all have to do the same things.
Kranium
AskWoody LoungerSo, here we are, the last regular Patch Tuesday for Windows 7.
I’m not gonna lie – this is enjoyably interesting. :]
Group B for WIN7 w/ ESU, plus trying out Linux builds in dual boot.
1 user thanked author for this post.
Barry
AskWoody LoungerI just noticed a oddity from yesterdays Updates. Yesterday afternoon i downloaded and installed KB4528760 the CU for 1909. It seemed to and showed that it installed just fine and there were no problems.
This morning i hit checked for updates and it offered KB7528760 again. While it was downloading i checked the version # and it was 18363.535 after the CU was installed the second time the version was 18363.592.
I am not sure if the CU actually failed or it was something else. Just thought i would throw this out there.
Barry
Windows 11 v22H2-
PKCano
ManagerI’m going to venture a guess.
The SSU is not in the list of patches to be installed, but it downloads and installs with the CU. I believe it presents itself in the Update History as the update as well as the CU doing this. If you look in the Installed Updates, you will see it listed as two separate updates with two different KB numbers.Supposedly, the update mechanism installs the SSU first, then the CU. This may be what you are seeing with what appears to be a second install. The Build number doesn’t change until the installation completes after the second reboot.
2 users thanked author for this post.
-
Barry
AskWoody LoungerI’m going to venture a guess.
The SSU is not in the list of patches to be installed, but it downloads and installs with the CU. I believe it presents itself in the Update History as the update as well as the CU doing this. If you look in the Installed Updates, you will see it listed as two separate updates with two different KB numbers.Supposedly, the update mechanism installs the SSU first, then the CU. This may be what you are seeing with what appears to be a second install. The Build number doesn’t change until the installation completes after the second reboot.
I believe you are correct. I looked at installed updates and it did not show 4528760 on 1/14 only on 1/15
Barry
Windows 11 v22H2
-
anonymous
Guest. . . not forgetting the EOL of Windows Server 2008.
I’ve been updating a Vista-32 machine with WS2008 x86 updates, since the end of Vista.
15.01.2020. Probably, the last day to trawl through the Security Update Summary, .Net Framework, Sevice Stack etc. Manually loading the updates.
JOB DONE !CraigS26
AskWoody PlusAnother 1909 WU without issues (Jan CU, MSRT, Net Frmwk 4.8, Svc Stack). Images were ready. 18363.592
Are you encountering the File Explorer Search bug?
No, although with an SSD/HDD combo an SSD article led me to Turn OFF Search Indexing, IF THAT matters / Cortana Never Active …. Just did a test search & all remains well.
W10 Pro 22H2 / Hm-Stdnt Ofce '16 C2R / HP Envy Desk-Ethernet - SSD-HDD/ i5(8th Gen) 12GB / GP=2 + FtrU=Semi-Annual + Feature Defer = 1 + QU=0
OscarCP
MemberAccording to this, the vulnerability under discussion, that is centered on the crypt32.dll, has been around for quite a while in Windows. At least from the early 2000s, it would seem:
https://docs.microsoft.com/en-us/windows/win32/seccrypto/crypt32-dll-versions
This has some interesting implications that each one of us can figure out by thinking about it.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AVfernlady
AskWoody LoungerUpdates that came in this morning:
Security and Quality Rollup for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 7 SP1 and Windows Server 2008 R2 SP1 (KB4535102)
2020-01 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4534310)
Windows Malicious Software Removal Tool x64 – January 2020 (KB890830)
All Checked and hiddenServicing stack update for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4536952)
Unchecked and hiddenChecked for updates again
Microsoft .NET Framework 4.8 for Windows 7 forx64 (KB4503548)
Unchecked and hiddenEdition Windows 11 Pro
Version 23H2
Installed on 10/19/2022
OS build 22631.27151 user thanked author for this post.
-
Win7and10
AskWoody LoungerI received the same, however, all were checked, so I hid them all.
From what has been said, the .NET Framework 4.8 is recommended and not important.
Did you install last month’s .NET Security and Quality Rollup? Mine was recommended.
Installed everything but that one as yet for December 2019 Updates.
All of this month were checked and now HIDDEN.Win 10 Home 22H2
-
fernlady
AskWoody Lounger -
PKCano
ManagerThe .NET Rollups should be installed if they are CHECKED.
Microsoft .NET Framework 4.8 for Windows 7 KB4503548 is the .NET 4.8 Installer.
If you have the earlier version of .NET 4.8 installed, AND KB4503548 is checked, you should install it.
If you don’t already have .NET 4.8 installed, it is not recommended for Win7. You shoud keep it hidden.
-
Win7and10
AskWoody Loungeranonymous
GuestKen Sims
AskWoody PlusMore from the SANS Internet Storm Center:
One quote:
Which operating systems are affected?
Only Windows 10 and Windows Server 2016 and 2019 are affected. Windows 7 is not affected. There was some confusion about this because Windows 7 is no longer officially supported after this patch release. But the January 14th patch Tuesday did cover Windows 7. The affected library, crypt32.dll (CryptoAPI), is present in older versions of Windows, including Windows 7. But not all versions of this library are affected. Out of support versions of Windows 10, like Windows 10 1709, are likely vulnerable, and you should upgrade to Windows 10 1809, the current “long term support” version.
The video referenced in the article can be viewed on YouTube:
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flawgeekdom
AskWoody_MVPI’m holding off on the Windows 10 machine as I just got it stabilized. The user profile was corrupt and had to be rebuilt. Let’s give it a few days.
Windows 7 machine needs to be connected for a look-see on updates.
On permanent hiatus {with backup and coffee}
offline▸ Win10Pro 2004.19041.572 x64 i3-3220 RAM8GB HDD Firefox83.0b3 WindowsDefender
offline▸ Acer TravelMate P215-52 RAM8GB Win11Pro 22H2.22621.1265 x64 i5-10210U SSD Firefox106.0 MicrosoftDefender
online▸ Win11Pro 22H2.22621.1992 x64 i5-9400 RAM16GB HDD Firefox116.0b3 MicrosoftDefenderKen Sims
AskWoody PlusMore from the SANS Internet Storm Center:
CVE-2020-0601 Followup
One quote:
Which operating systems are affected?
Only Windows 10 and Windows Server 2016 and 2019 are affected. Windows 7 is not affected. There was some confusion about this because Windows 7 is no longer officially supported after this patch release. But the January 14th patch Tuesday did cover Windows 7. The affected library, crypt32.dll (CryptoAPI), is present in older versions of Windows, including Windows 7. But not all versions of this library are affected. Out of support versions of Windows 10, like Windows 10 1709, are likely vulnerable, and you should upgrade to Windows 10 1809, the current “long term support” version.
The video referenced in the article can be viewed on YouTube:
SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI FlawSANS has updated CVE-2020-0601 Followup including the statement: UPDATE: An Exploit has been made public!
I’m not going to apply updates yet, but I’m definitely going to continue monitoring information from SANS and others.
Ken Sims
AskWoody PlusA new article from Ars Technica:
Critical Windows 10 vulnerability used to Rickroll the NSA and GithubFirst two paragraphs:
Less than a day after Microsoft disclosed one of the most critical Windows vulnerabilities ever, a security researcher has demonstrated how attackers can exploit it to cryptographically impersonate any website or server on the Internet.
Researcher Saleem Rashid on Wednesday tweeted images of the video “Never Gonna Give You Up,” by 1980s heartthrob Rick Astley, playing on Github.com and NSA.gov. The digital sleight of hand is known as Rickrolling and is often used as a humorous and benign way to demonstrate serious security flaws. In this case, Rashid’s exploit causes both the Edge and Chrome browsers to spoof the HTTPS verified websites of Github and the National Security Agency. Brave and other Chrome derivatives, as well as Internet Explorer, are also likely to fall to the same trick. (There’s no indication Firefox is affected.)
-
woody
Manager -
Ken Sims
AskWoody PlusThe article was mentioned, with a few sentences quoted, in this article on Threatpost:
PoC Exploits Published For Microsoft Crypto BugThreatpost is for cybersecurity professionals, which I am not. But I am a cybersecurity hobbyist so I read a number of sites meant for security professionals.
-
Ken Sims
AskWoody PlusNote that while some of the articles that I link to are meant for security professionals (e.g. SANS), some of them are meant for the general public (e.g. Ars Technica) on websites that may or may not be primarily focused on cybersecurity (Ars Technica is not).
1 user thanked author for this post.
-
-
bsfinkel
AskWoody LoungerWindows 7 January patches: KB4535102 .NET
KB4534310 Win 7I had not installed them Tuesday (I only installed MRT). This morning I powered down to install a new SSD disk on which I will install Win 10. But Windows Update had these two checked, so they auto-installed prior to the power down. Then I rebooted in safe mode to check to see if the SSD was OK, and Windows did its normal “chkdsk c:” and other things (because it took more than 12 minutes). But in safe mode Windows does not tell me what it is doing, as it displays the driver names that it has loaded before safe mode starts. Then I rebooted into regular mode. I checked the EventVwr, and it showed that the two patches had been installed, and a reboot was required. Then I saw that the two patches had failed with code 80070643. Widows update now shows me only KB4536952 2020-01 Servicing Stack Update Win 7. I have no idea what that 80070643 error code means. I looked at one thread (via Google), and it was obvious that all the “those knowledgeable” who were responding had no idea what the error code signified. Would I get that error code if my reboot after the patch installation was not a reboot into full Windows 7? Many years ago I would patch Win 7, then reboot into XP to patch, and then reboot into Win 7; back then the Win 7 patches would not complete installation because I had rebooted into XP.
I know that I will not see the two failed patches again (if indeed they did not install) until I install the SSU update. Is the SSU update safe, or is it too soon to know if the SSU patch is OK to install?
1 user thanked author for this post.
Win7and10
AskWoody LoungerHere is what I received for Windows 7 2020-01 on 1/14/2020
Security and Quality Rollup for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 7 SP1 and Windows Server 2008 R2 SP1 (KB4535102) – are there issues with this Rollup? This is labeled as Recommended and not Important.
2020-01 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB4534310)
Windows Malicious Software Removal Tool x64 – January 2020 (KB890830)
All HiddenMicrosoft .NET Framework 4.8 for Windows 7 forx64 (KB4503548)
Hidden and do not plan to install on Windows 7.Windows update automatically checked again and the following appeared:
Servicing stack update for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4536952)
HiddenThis leads me to the question of last month. The SSU appeared AFTER all the updates were HIDDEN, therefore, when the all clear is given, will the updates install first or the SSU?
NOTE: KB 45330905 .NET Security and Quality Rollup for December 2019 was not installed as yet as some have reported issues with the .NET rollup. When I do install, it will be before the other January Patches. Has anyone had issues with the .NET Security Rollups? Also, if I skip this December rollup will I be OK with just the final January Rollup? This is labeled as Recommended and not Important.
Thanks….
Win 10 Home 22H2
-
This reply was modified 3 years, 10 months ago by
Win7and10.
-
PKCano
Manager -
Win7and10
AskWoody LoungerPKCano,
Would you still install the KB 45330905 .NET Security and Quality Rollup for December 2019 or just wait and install all the January updates when we are given the all clear since they are cummulative?
All of my .NET Security and Quality Rollups come in RECOMMENDED, which are to me important. 🙂
Win 10 Home 22H2
-
PKCano
Manager -
Win7and10
AskWoody LoungerCan’t recall if the .NET Security and Quality Rollup for December 2019 KB4533095 was checked, however, I have installed these Rollups in the past, so I presume it WAS checked and presume it should be installed. Didn’t know if this one had caused a problem with anyone, thanks.
Win 10 Home 22H2
-
-
-
Ken Sims
AskWoody PlusNew article from the SANS Internet Storm Center:
Summing up CVE-2020-0601, or the Let?s Decrypt vulnerabilityOf special interest, you can go to https://curveballtest.com/ to test if your browser is vulnerable to CVE-2020-0601.
On my unpatched system, Firefox (my default browser) is not vulnerable and Microsoft Edge is vulnerable.
3 users thanked author for this post.
anonymous
GuestFor what it’s worth – This is installed network wide without any apparent issues.
All Win10 PCs, varied mix of 1803 (ok, just one of them), 1809, 1903, 1909, LTSC 2016, LTSC 2019. Office 2016 ISO, Office 2019, Office 365.
Server 2016 & 2019 running domain controllers, file/print servers, SQL, Exchange 2016, SCCM CB, DPM 2019, IIS sites, RD Web, Terminal Server.
anonymous
GuestI am running Windows 10 version 1903. Thru my neglect, Version 1909 was downloaded, but I have paused any more downloading or installing until February. Is there a method to download the new patches without installing the already downloaded Windows version 1909?
Thank you for your assistance.
-
PKCano
ManagerWe need to know if you are running Win10 Home or Win10 Pro.
But normally, when Win10 downloads the install is automatic. To be certain which version of Win10 you have, in the Searchbox, type “winver” (without the quotes) and press Enter. Let us know what version and Build is installed. The Build will look like 1838x.xxx
-
anonymous
GuestEdition: Windows 10 Home
Version: 1903
OS build: 18362.535
I just ran the link from the previous post on this forum (https://curveballtest.com/) and it showed that I am vulnerable to CVE-2020-0601. Does this mean I should install all updates now?
Once again, thank you for all your help.
-
PKCano
Manager
-
-
anonymous
GuestWindows Defender No Longer Updates Unless Windows Update Service Enabled
I thought that I would post this to the forum as I discovered this today. Normally my first activity on my machine (a Windows 8.1 64-bit system) is to update the Windows Defender virus definitions each morning. This has worked flawlessly for years with the Windows Update service disabled. By design Microsoft designed Windows Defender to be independent of Windows Update allowing defender files to be downloaded regardless of the state of the windows update service. On patch Tuesday(1/14/20) I launched windows update and installed the patch Security Intelligence Update for Windows Defender Antivirus (kb2267602) Version 1.307.2344.0 along with the Windows Malicious Software Removal Tool x64 – January 2020 (KB890830) the 2 most benign patches of the 4 important patches listed for Jan.
A day later I went to run Windows Defender, pressed the update button and no updates were found. Another day went by and the same thing happened. This morning I decided to investigate. I enabled the windows update service then opened Windows Defender and pressed update files. The data files downloaded and installed successfully. It would seem that this update broke the independence of the Windows Defender Service making it now dependent on windows update to run. Is this a nudge on Microsoft’s part to keep the Windows Update service perpetually enabled so they can force anything (including a covert win 10 upgrade) upon us holdouts? Admittedly this issue is minor; one can just enable and disable windows update before launching windows defender, but that is an extra 30 seconds I would rather not take. Any ideas on how to re-establish Windows Defenders’ independence?
DriftyDonN
AskWoody PlusNew article from the SANS Internet Storm Center:
Summing up CVE-2020-0601, or the Let?s Decrypt vulnerabilityOf special interest, you can go to https://curveballtest.com/ to test if your browser is vulnerable to CVE-2020-0601.
On my unpatched system, Firefox (my default browser) is not vulnerable and Microsoft Edge is vulnerable.
I am using Firefox 72.0.1
(https://curveballtest.com/ tells me in big letters I am vulnerable. In smaller letters it says Firefox is NOT vulnerable. So…yea or nay, yin or yang? Any ideas?
Thank you.
DriftyDonN
Win10 ver 1903 build 18362.535, paused updates til 17Feb
-
This reply was modified 3 years, 10 months ago by
DriftyDonN. Reason: win version added
Ken Sims
AskWoody PlusI’m running essentially the same thing:
Windows 10 Pro, version 1903, build 18362.535, updates paused until Feb 15th, using Firefox (64-bit) version 72.0.1.
I get a green bar across the middle of the screen that says “You Are Not Vulnerable”.
It is only with Microsoft Edge that I get a red square in the middle of the screen that says “You Are Vulnerable”.
The only thing I can think of is if your configurations relating to certificate security have been changed. I believe there is a configuration to use the OS root store instead of the one in Firefox.
Looking in about:config, I see a configuration called security.enterprise_roots.enabled which is set to false. That if is set to true in your configuration, that could be the cause of the problem.
Or there could be some other certificate security setting causing the problem.
anotherwindowsuser
AskWoody Loungerbsfinkel
AskWoody LoungerHere is an update on my Windows 7 system. This morning I wanted to install the SSU patch, as someone above reported that it was safe to install. Windows Update no longer had the SSU update displayed, but it did have the Win 7 and .NET patches that had failed earlier in the week. It also had MSE pattern 1.307.2452.0, which had been installed at 12:30 yesterday. I have seen frequently that Windows Update wants me to install an MSE pattern update that already been installed. I have no idea if the second patch is an update to the first patch. I assume not, as if a bad MSE pattern patch were to be released, it would be fixed in the next pattern update,
I guess that I will not be able to install the SSU update until I have installed the two January patches.
One other item – MRT. What does this patch do besides replacing \windows\system32\mrt.exe and running it? When I run Windows Update, I get the message “creating a restore point”, and sometimes this message is frequently not changed when the actual patch installs. So I never know exactly when the patch is being installed. The MRT patch took about 1.5 hours from the time I selected it to the time it finished. I did not time this, as I was doing other things while the patch was being installed. I did look at the Task Manager a few times while the “restore point” message was being displayed, and mrt.exe had not yet started. So, I believe that the unneccessary restore point creation took over an hour.
anonymous
GuestWin7and10
AskWoody LoungerJust a follow-up question, pardon my caution with Windows 7 x 64 SP1.
Can’t recall if the .NET Security and Quality Rollup for December 2019 KB4533095 was checked, however, I have installed these Rollups in the past, so I presume it WAS checked and presume it should be installed. Right now I have it hidden.
Didn’t know if this one had caused a problem with anyone as I have read that it took a long time to install??
We’re on the final countdown for the patches and have done well with them so far.
If no problems reported, will install over the weekend.
Thanks! 🙂
Win 10 Home 22H2
DriftyDonN
AskWoody PlusI’m running essentially the same thing:
Windows 10 Pro, version 1903, build 18362.535, updates paused until Feb 15th, using Firefox (64-bit) version 72.0.1.
I get a green bar across the middle of the screen that says “You Are Not Vulnerable”.
It is only with Microsoft Edge that I get a red square in the middle of the screen that says “You Are Vulnerable”.
The only thing I can think of is if your configurations relating to certificate security have been changed. I believe there is a configuration to use the OS root store instead of the one in Firefox.
Looking in about:config, I see a configuration called security.enterprise_roots.enabled which is set to false. That if is set to true in your configuration, that could be the cause of the problem.
Or there could be some other certificate security setting causing the problem.
This test page is for edge, IE, Chrome only…..SPECIFICALLY NOT FOR FIREFOX>
BTW< how do I change the value back again in firefox about:config? It seems to be locked.
(redfaced)
Drifty
-
Ken Sims
AskWoody PlusIn about:config, double-click a line to change the value.
If it’s a true/false value, double-clicking the line will toggle it.
If it’s some other kind of value, double-clicking the line will open up the value so that it can be changed.
If a line is bolded, the value has been changed. If not, it is the default. Changing a value back to the default will remove the bolding.
-
This reply was modified 3 years, 10 months ago by
Ken Sims.
1 user thanked author for this post.
-
This reply was modified 3 years, 10 months ago by
DriftyDonN
AskWoody PlusIn about:config, double-click a line to change the value.
If it’s a true/false value, double-clicking the line will toggle it.
If it’s some other kind of value, double-clicking the line will open up the value so that it can be changed.
If a line is bolded, the value has been changed. If not, it is the default. Changing a value back to the default will remove the bolding.
-
This reply was modified 3 years, 10 months ago by
Ken Sims.
security.<wbr />enterprise_roots.<wbr />enabled
This line has a padlock at the beginning(before “security…”) and the line is greyed out. The other lines are not. The value is set at “true” now…it was false.
Thanks for helping!
D
BTW, no response to double clicking, no real choice with right click(normal drop down menu)
-
This reply was modified 3 years, 10 months ago by
DriftyDonN.
-
Ken Sims
AskWoody PlusI’m sorry, but I’ve never seen that and have no idea what would cause it. The only way that I can think of to fix it is to find the profile directory with the configurations, find the correct file, and manually edit it with a text editor.
1 user thanked author for this post.
DriftyDonN
AskWoody PlusI’m sorry, but I’ve never seen that and have no idea what would cause it. The only way that I can think of to fix it is to find the profile directory with the configurations, find the correct file, and manually edit it with a text editor.
I’m pretty sure Bitdefender has now gotten control over that particular setting. I have a newer acer w/ same win ver, FF, BD and that line is also padlocked on the newer machine. Curious it wasn’t when I checked earlier on the older machine….but BD had updated after I changed the setting. So now it’s “true”…..
Thanks
DriftyDonN
-
Ken Sims
AskWoody Plus
Viewing 64 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Top Hookup Platform (Awaiting moderation)
by
felixpettis3932
31 minutes ago -
Debian SparkyLinux 7.2 “Orion Belt”
by
Alex5723
3 hours, 39 minutes ago -
Burt Wolf on Communication
by
Susan Bradley
5 hours, 54 minutes ago -
Converting HHD iMac to SSD
by
pmcjr6142
31 minutes ago -
Bluetooth hack : Hi, My Name Is Keyboard
by
Alex5723
1 hour, 25 minutes ago -
Windows sees RAW, chkdsk sees NTFS
by
Cormy1
4 hours ago -
Microsoft SMB V1 removal – any updated information
by
Laurie Bronstein
3 hours, 48 minutes ago -
ISO portable PC keyboard that matches standard Dell keyboard
by
glnz
16 hours, 47 minutes ago -
End of support W10
by
barrym
22 hours, 42 minutes ago -
MS-DEFCON 2: Copilot for Christmas
by
Susan Bradley
6 hours, 33 minutes ago -
Sudden appearance of Edge Search Bar
by
EricB
13 hours, 28 minutes ago -
LogoFAIL firmware exploit bypasses hardware and software security
by
Alex5723
13 hours, 8 minutes ago -
Microsoft outlook ignores the registry keys
by
Heri Harry
1 day, 23 hours ago -
Windows 11 Insider Preview Build 22635.2841 released to BETA
by
joep517
1 day, 18 hours ago -
Thunderbird doesn’t open folders at most recent email in Inbox
by
LHiggins
22 hours, 45 minutes ago -
Three queries about the MS Outlook app on iPadOS
by
TonyC
1 day, 22 hours ago -
Win 10 22H2 November patches: Why do I have these 4 Windows App Runtime apps?
by
WCHS
5 hours, 12 minutes ago -
KB5032278
by
fpefpe
12 hours, 59 minutes ago -
A web browser security testing & privacy testing tool.
by
TechTango
2 days, 8 hours ago -
IOS 17.1.2 looses text alert tone
by
J9438
1 day, 21 hours ago -
What to know about CentOS Linux EOL
by
Alex5723
17 hours, 53 minutes ago -
ESU announcement coming?
by
Susan Bradley
15 hours, 8 minutes ago -
December 2023 Office non-Security Updates
by
PKCano
2 days, 9 hours ago -
Widespread Printer Bug caused by Windows Store!
by
Intrepid
19 hours, 58 minutes ago -
Xbox question
by
fernlady
2 days, 16 hours ago -
Unfound Updates
by
rebop2020
2 days, 13 hours ago -
Thieves rob DC Uber Eats driver, reject Android phone for not being iPhone
by
Alex5723
2 days, 14 hours ago -
McAfee popup add (from micro. Store)
by
Robin Heckler
2 days, 16 hours ago -
Random Screen Shut Downs (Windows 11 Pro)
by
OkCarl
1 day, 3 hours ago -
CPU performance degradation after 23H2 update
by
Alex5723
3 days, 4 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2023 by AskWoody Tech LLC. All Rights Reserved.