8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
8.1 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
76.0%
This security update resolves a Microsoft SharePoint Server spoofing vulnerability. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2023-28288.
Notes:
This public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:
To help customers secure their environments, Microsoft is introducing integration between SharePoint Server 2016 and the Windows Antimalware Scan Interface (AMSI). The AMSI integration functionality is designed to prevent malicious web requests from reaching SharePoint endpoints. For example, it prevents the exploitation of a security vulnerability in a SharePoint endpoint before the official fix for the security vulnerability is installed. For more information, see Configure AMSI integration with SharePoint Server.
**Note:**To get the improvement, you have to install KB 5002370 together with this update.
This security update also contains an improvement and a fix for the following nonsecurity issue in SharePoint Enterprise Server 2016:
After you install this security update for SharePoint Server 2016 running on Windows Server 2012 R2, you will receive an “HTTP Error 503. The service is unavailable” error message. For more information and the workaround for this known issue, see HTTP Error 503 after installing April 11, 2023 updates for SharePoint Server 2016 on Windows Server 2012 R2 (KB5026765).
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
To get the standalone package for this update, go to the Microsoft Update Catalog website.
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
For deployment information about this update, see Deployments - Security Update Guide.
This security update replaces previously released security update 5002368.
File name | SHA256 hash |
---|---|
sts2016-kb5002385-fullfile-x64-glb.exe | 8D51EE29A7751D553B0BD952FD714502A845EBFEEC08D43F86129C7C4D4B6E9E |
Download the list of files that are included in security update 5002385.
Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security
The following table summarizes some of the most important changes to this topic.Date | Description |
---|---|
April 18, 2023 | Added a “Known issues in this update” section to describe an issue that users may experience. |
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
8.1 High
AI Score
Confidence
High
0.005 Low
EPSS
Percentile
76.0%