Microsoft released urgent patches that fix bugs in the work of IPSEC and L2TP VPN

Microsoft released urgent patches
Written by Emma Davis

Microsoft has again released urgent “patches for patches” as the January updates interfered in the work of IPSEC and L2TP VPN.

According to Bleeping Computer, the January “Update Tuesday” brought not only patches, but also a lot of problems for administrators and users, since after installing the Windows 10 cumulative updates KB5009543 and Windows 11 KB5009566, they had problems connecting to L2TP VPN.

Microsoft has confirmed that “some IPSEC connections may not work” and the issue affects VPN connections using the L2TP protocol as well as IP security Internet Key Exchange (IPSEC IKE).

In addition, Bleeping Computer reminds that problems after updates also arose in the operation of Windows Server. According to complaints from administrators, Windows domain controllers exhibited spontaneous reboots, Hyper-V would not start, and Windows Resilient File System (ReFS) volumes were no longer available.

As journalists now report, the company hastened to release unscheduled patches to eliminate the bugs that have arisen.

The update fixes issues related to VPN connectivity, restarting Windows Server domain controllers, virtual machine startup failures, and the inability to mount ReFS-formatted removable drives.write Microsoft engineers.

“Patches for patches” are already available for download through the Microsoft Update Catalog, and some of them can also be installed directly through Windows Update as optional updates. That is, users will have to check for updates manually (after all, they are not mandatory).

For example, the following updates can only be downloaded and installed through the Microsoft Update Catalog:

  1. Windows 8.1, Windows Server 2012 R2: KB5010794;
  2. Windows Server 2012: KB5010797.

Updates for these versions of Windows are also available through Windows Update as optional:

  1. Windows 11 version 21H1 (original release): KB5010795;
  2. Windows Server 2022: KB5010796;
  3. Windows 10 Version 21H2: KB5010793;
  4. Windows 10 Version 21H1: KB5010793;
  5. Windows 10 Version 20H2, Windows Server Version 20H2: KB5010793;
  6. Windows 10 Version 20H1, Windows Server Version 20H1: KB5010793;
  7. Windows 10, version 1909, Windows Server, version 1909: KB5010792;
  8. Windows Server 2019: KB5010791 (released 01/18/22);
  9. Windows 10, version 1607, Windows Server 2016: KB5010790;
  10. Windows 10 version 1507: KB5010789;
  11. Windows 7 SP1: KB5010798;
  12. Windows Server 2008 SP2: KB5010799.

Those who cannot immediately install unscheduled “patches for patches” are recommended to remove updates KB5009624, KB5009557, KB5009555, KB5009566 and KB5009543.

However, keep in mind that removing them will remove fixes for all bugs that were released as part of the January “Update Tuesday”.

Let me remind you that we wrote that New year 2022 caused disruptions in Microsoft, Honda, Acura and SonicWall products, and also that Microsoft urged administrators to fix OMIGOD vulnerabilities on their own.

Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Emma Davis

I'm writer and content manager (a short time ago completed a bachelor degree in Marketing from the Gustavus Adolphus College). For now, I have a deep drive to study cyber security.

Leave a Reply

Sending