CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
96.1%
12/8/20
For information about Windows update terminology, see the article about the types of Windows updates and the monthly quality update types. For an overview of Windows 10, version 1507, see its update history page.
**Important:**Windows updates do not install Microsoft Store application updates. If you are an enterprise user, see Microsoft Store apps - Configuration Manager. If you are a consumer user, see Get updates for apps and games in Microsoft Store.
This security update includes quality improvements. Below is a summary of the key issues that this update addresses when you install this KB. If there are new features, it lists them as well. The bold text within the brackets indicates the item or area of the change we are documenting.
Symptom | Workaround |
---|---|
After installing this security update, you might face issues with booting Linux if you have enabled the dual-boot setup for Windows and Linux in your device. Resulting from this issue, your device might fail to boot Linux and show the error message “Verifying shim SBAT data failed: Security Policy Violation. Something has gone seriously wrong: SBAT self-check failed: Security Policy Violation.”The August 2024 Windows security update applies a Secure Boot Advanced Targeting (SBAT) setting to devices that run Windows to block old, vulnerable boot managers. This SBAT update will not be applied to devices where dual booting is detected. On some devices, the dual-boot detection did not detect some customized methods of dual-booting and applied the SBAT value when it should not have been applied. | Please refer to the workaround mentioned in Windows release health site for this issue. |
Before you install this update****Important Before you install this September 10, 2024 update, you must first install the September 10, 2024, servicing stack update (SSU) (KB5043936). This SSU addresses the issue mentioned in CVE-2024-43491.SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU and applying Microsoft security updates. For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions. To get the standalone package for the latest SSU, search for it in the Microsoft Update Catalog.PrerequisiteTo install any LCU dated September 10, 2024, and onward, you must first install SSU KB5043936. If your device or offline image does not have this SSU, you cannot install any LCUs released after that date.If you are using Windows Update, the latest SSU (KB5043936) will be offered to you automatically. After you install the SSU, you will be able to install the LCU. If you are a WSUS admin, you must approve both the SSU (KB5043936) and LCU (KB5043083).Install this updateTo install this update, use one of the following Windows and Microsoft release channels.
Windows UpdateBusinessCatalogServer Update Services
Available | Next Step |
---|---|
Yes | None. This update will be downloaded and installed automatically from Windows Update and Microsoft Update. |
Available | Next Step |
---|---|
Yes | None. This update will be downloaded and installed automatically from Windows Update for Business in accordance with configured policies. |
Available | Next Step |
---|---|
Yes | To get the standalone package for this update, go to the Microsoft Update Catalog website. |
Available | Next Step |
---|---|
Yes | This update will automatically sync with Windows Server Update Services (WSUS) if you configure Products and Classifications as follows:Product: Windows 10Classification: Security Updates |
File informationFor a list of the files that are provided in this update, download the file information for cumulative update 5043083.