Applies ToWindows Server 2022

Release Date:

11/07/2023

Version:

OS Build 20348.1850

For information about Windows update terminology, see the article about the types of Windows updates and the monthly quality update types. For an overview of Windows Server 2022, see its update history page.     

Note Follow @WindowsUpdate to find out when new content is published to the Windows release health dashboard.     

Improvements

This security update includes quality improvements. When you install this KB:

  • New! This update improves several simplified Chinese fonts and the Microsoft Pinyin Input Method Editor (IME). They now support GB18030-2022. Characters in the Standard Chinese Characters List (GB18030-2022 implementation level 2) are available in Microsoft Yahei (regular, light, and bold), Dengxian (optional font: regular, light, and bold), and Simsun. The Simsun Ext-B font (GB18030-2022 implementation level 3) now supports Unicode CJK Unified Ideographs Extensions E and F.

  • New!  This update removes Simplified Chinese handwriting recognition from Windows Server 2022. This is because conformant handwriting recognition is not available for Windows Server. Updated media will have this change. To update existing images, use the DISM tool to remove the Simplified Chinese Handwriting capability.

  • This update addresses an issue that affects console applications. They fail when you set the system locale to Japanese.

  • This update addresses an issue that affects the Notepad combo box in Settings. It fails to show all the available options.

  • This update addresses a race condition. It occurs when codepages load during early startup. This might cause a 0x7e stop error.

  • This update addresses an issue that affects Microsoft Edge IE mode. The text on the status bar is not always visible.

  • This update addresses an issue that affects the Microsoft HTML Application Host (HTA). This issue blocks code execution that uses Microsoft HTA. This occurs when you turn on Windows Defender Application Control (WDAC) User Mode Code Integrity (UMCI) enforced mode.

  • The update addresses a random issue that affects svchost.exe. There is significant memory growth in a system. This occurs when svchost.exe contains the User Access Logging Service (UALSVC).

  • This update addresses an issue that affects all the registry settings under the Policies paths. They might be deleted. This occurs when you do not rename the local temporary user policy file during Group Policy processing.

  • This update addresses an issue that affects dot sourcing. It fails for files that contain a class definition in Windows PowerShell.

  • This update addresses an issue that affects .msi files. A minor update is not installed. This occurs when you use the EnterpriseDesktopAppManagement configuration service provider (CSP) to distribute the .msi file.

  • This update addresses an issue that affects msftconnecttext.net. It gets excessive HTTP traffic.

  • This update addresses an issue that affects the Spooler service. It stops working. This issue occurs when you print using a certain workspace.

  • The update addresses an intermittent issue that affects an audio stream. The issue disrupts the stream.

  • This update addresses an issue that affects NCryptGetProperty(). When you call it with NCRYPT_KEY_TYPE_PROPERTY, the system returns 0x1 instead of 0x20. This occurs when the key is a machine key.

  • This update addresses an issue that affects a tib.sys driver. It does not load. This occurs when HyperVisor-protected Code Integrity (HVCI) is enabled.

  • This update addresses an issue that affects HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders. You can now set and maintain the correct default permissions for this directory path. When the permissions are wrong, the Start menu, search, and Azure Active Directory (Azure AD) authentication fail.

  • This update addresses an issue that affects Active Directory Users & Computers. It stops responding. This occurs when you use TaskPad view to enable or disable many objects at the same time.

  • This update addresses an issue that affects File Explorer. It might stop responding indefinitely. This occurs after you try to view the effective access permissions for files in File Explorer.

  • This update addresses an issue that affects Live Migration. It might fail in a stretch cluster deployment. This occurs because the Storage Replica fails to retry after it receives a retry error from the Cluster API.

  • This update addresses an issue that affects cluster name object of failover clustering. You cannot repair it on Azure Virtual Machines.

  • This update addresses an issue that affects Remote Server Administration Tools (RSAT). In the Standard edition, Network Controller Management Tools is missing from the RSAT dialog.

If you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device.

For more information about security vulnerabilities, please refer to the Security Update Guide and the July 2023 Security Updates.

Windows Server 2022 servicing stack update - 20348.1846

This update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.

Known issues in this update

Microsoft is not currently aware of any issues with this update.

How to get this update

Before installing this update

Microsoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.

Install this update

Release Channel

Available

Next Step

Windows Update and Microsoft Update

Yes

None. This update will be downloaded and installed automatically from Windows Update.

Windows Update for Business

Yes

None. This update will be downloaded and installed automatically from Windows Update in accordance with configured policies.

Microsoft Update Catalog

Yes

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Windows Server Update Services (WSUS)

Yes

This update will automatically sync with WSUS if you configure Products and Classifications as follows:

Product: Microsoft Server operating system-21H2

Classification: Security Updates

If you want to remove the LCU

To remove the LCU after installing the combined SSU and LCU package, use the DISM/Remove-Package command line option with the LCU package name as the argument. You can find the package name by using this command: DISM /online /get-packages.

Running Windows Update Standalone Installer (wusa.exe) with the /uninstall switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.

File Information

For a list of the files that are provided in this update, download the file information for cumulative update 5028171

For a list of the files that are provided in the servicing stack update, download the file information for the SSU - version 20348.1846

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.