{"id":17830,"date":"2020-02-26T10:30:06","date_gmt":"2020-02-26T18:30:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/26\/news-11563\/"},"modified":"2020-02-26T10:30:06","modified_gmt":"2020-02-26T18:30:06","slug":"news-11563","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/26\/news-11563\/","title":{"rendered":"Microsoft Patch Alert: February 2020 patches bring fire and ice but seem to have settled \u2013 finally."},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 26 Feb 2020 09:44:00 -0800<\/strong><\/p>\n<p>The real stinker this month, KB 4524244, rolled out the automatic update chute for four full days until Microsoft yanked it \u2013 leaving a trail of wounded PCs, primarily HP machines, in its wake. The other big-time bug in this month\u2019s patches, a race condition in the KB 4532693 Win10 version 1903 and 1909 cumulative update installer, hasn\u2019t been officially acknowledged by Microsoft outside of a blog post. But at least it\u2019s well known and understood.<\/p>\n<p>Folks running SQL Server and Exchange Server networks need to get patched right away.<\/p>\n<p>Patch Tuesday brought KB 4524244 for Windows 10 owners, a bizarre single-purpose patch apparently directed at one specific UEFI bootloader. I\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3528302\/the-mess-behind-microsoft-s-yanked-uefi-patch-kb-4524244.html\" rel=\"noopener\" target=\"_blank\">talked about it last week<\/a>.<\/p>\n<p>The patch was pulled on Friday, but in the interim lots of people reported problems. Most notably, many folks running HP machines with Ryzen processors saw their machines hang, followed by an HP Sure Start Recovery message saying Sure Start had \u201cdetected an unauthorized change to the Secure Boot Keys.\u201d\u00a0<a href=\"https:\/\/support.hp.com\/us-en\/product\/hp-elitebook-735-g5-notebook-pc\/18804892\/document\/c06572866\" rel=\"noopener nofollow\" target=\"_blank\">HP has posted a list<\/a> of affected machines:<\/p>\n<p>HP EliteBook 735 G5 Notebook PC, 735 G6, 745 G5, 745 G6,\u00a0 755 G5, and HP ProBook 645 G4 Notebook PCs. HP EliteDesk 705 35W G4 Desktop Mini PC, 705 65W G4 Mini PC, 705 G4 Microtower PC, 705 G4 Small Form Factor PC, 705 G4 Workstation Edition, 705 G5 Desktop Mini PC, 705 G5 Small Form Factor PC, HP mt44 Mobile Thin Client, mt45 Mobile Thin Client, and HP ProDesk 405 G4 Small Form Factor PC.<\/p>\n<p>If you have any of those machines and left your PC open to Microsoft\u2019s updates during Patch Week, you got clobbered. In addition, Microsoft documents a bug in the \u201cReset this PC\u201d function but doesn\u2019t give any details.<\/p>\n<p>There\u2019s nothing you can do about it now. If KB 4524244 installed successfully, everything\u2019s OK. If it didn\u2019t, you need to follow <a href=\"https:\/\/support.hp.com\/us-en\/product\/hp-elitebook-735-g5-notebook-pc\/18804892\/document\/c06572866\" rel=\"noopener nofollow\" target=\"_blank\">HP\u2019s removal instructions<\/a> or <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4524244\/security-update-for-windows-10-february-11-2020\" rel=\"noopener nofollow\" target=\"_blank\">Microsoft\u2019s removal instructions<\/a> to get things working again.<\/p>\n<p>Shortly after the Patch Tuesday patches arrived, we started seeing reports from folks who installed the Win10 1903 and 1909 cumulative update, KB 4532693, saying that their desktops got wiped out. A little poking revealed that all of their customizations had been tossed \u2013 icons, wallpaper \u2013 and many of their files weren\u2019t where they left them.<\/p>\n<p>Long story short, it looks like the patch gets ensnared in a race condition bug, which I <a href=\"https:\/\/www.computerworld.com\/article\/3528771\/with-a-fix-for-the-temporary-profile-bug-still-elusive-win10-1903-and-1909-customers-should-check-p.html\">wrote about last week<\/a>. We\u2019ve never been able to pin down which other programs trigger the race condition, but at least in some cases certain antivirus and \u201csecure banking software\u201d programs will leave your PC with a dangling temporary profile.<\/p>\n<p>Microsoft hasn\u2019t identified the offending software. Nor has it even acknowledged the problem either on the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4532693\/windows-10-update-kb4532693\" rel=\"noopener nofollow\" target=\"_blank\">Knowledge Base article page<\/a> or the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-information\/status-windows-10-1909\" rel=\"noopener nofollow\" target=\"_blank\">Windows Release Information status page<\/a>, two places that bugs like this are traditionally documented. (Perhaps Microsoft figures it\u2019s the other software\u2019s problem, so it has no need to report it?)<\/p>\n<p>Fortunately, there\u2019s a\u00a0<a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/all\/cumulative-updates-february-11th-2020\/548d4ded-39a1-4270-a866-627ea7c25de6?auth=1\" rel=\"noopener nofollow\" target=\"_blank\">Microsoft Answers forum post<\/a> that addresses the problem:<\/p>\n<p>Microsoft is aware of some customers logging into temporary profile after installing KB4532693, on both versions 1903 and 1909.<\/p>\n<p>Rebooting into Safe Mode* and then starting back in normal Mode should resolve this issue for most customers.<\/p>\n<p>You may uninstall any secure banking software or anti-virus in the temporary profile which may resolve this if the above steps do not help.<\/p>\n<p>If you didn\u2019t accidentally find that explanation, or don\u2019t know what a temporary profile is, or how it could get secure banking software, heaven help ya. But at least Microsoft \u201cis aware\u201d of the problem.<\/p>\n<p>How many people were affected by those high-profile bugs? I don\u2019t know. Judging by the number of complaints online \u2013 hardly a reliable metric \u2013 both of the problems were widespread and became apparent shortly after release.<\/p>\n<p>HP could probably come up with a tally of the number of afflicted machines and whether or not those machines installed the buggy UEFI patch. But the only organization that has comprehensive numbers about these bugs is Microsoft, and it\u2019s not talking.<\/p>\n<p>Think of all of that lovely telemetry we\u2019re providing to Microsoft.<\/p>\n<p>That \u201cexploited\u201d <a href=\"https:\/\/www.computerworld.com\/article\/3526558\/patch-tuesday-99-holes-exploited-ie-fix-win7-mayhem-and-uefi-ghost.html\">Internet Explorer JScript hole<\/a>, CVE-2020-0674 \u2013 the one that prompted computer security \u201cexperts\u201d to tell you that you had to get patched RIGHT NOW? It hasn\u2019t gone anywhere. This is the <a href=\"https:\/\/www.computerworld.com\/article\/3514599\/worried-about-an-nsa-chainoffools-curveball-attack-there-are-lots-of-moving-parts-test-your-system.html\">second month in a row<\/a> that we\u2019ve been inundated by Chicken Little warnings about the need to get patched immediately. Look where <a href=\"https:\/\/www.computerworld.com\/article\/3402718\/the-case-against-knee-jerk-installation-of-windows-patches.html\">knee-jerk installation of new patches<\/a> has left folks running HP Ryzen computers, or the unidentified \u201csecure banking software,\u201d this month.<\/p>\n<p>Those of you running Windows 7, who haven\u2019t paid for Extended Security Updates, should know that 0patch <a href=\"https:\/\/blog.0patch.com\/2020\/02\/our-first-weeks-of-securing-windows-7.html\" rel=\"noopener nofollow\" target=\"_blank\">has released a micro patch<\/a> for that particular security hole. It also has an <a href=\"https:\/\/0patch.com\/poc\/CVE-2020-0674\/0patch_test.html\" rel=\"noopener nofollow\" target=\"_blank\">online test<\/a> you can use to confirm that your Win7\/IE 11 system has properly swallowed the micro fix.<\/p>\n<p>To be sure, there <strong><em>are<\/em><\/strong> major security holes that need your attention, but only if you\u2019re in charge of a network running <a href=\"https:\/\/www.askwoody.com\/2020\/running-a-sql-server-heads-up-you-need-to-install-this-months-patches-quickly\/\" rel=\"noopener nofollow\" target=\"_blank\">SQL Server<\/a> or <a href=\"https:\/\/www.askwoody.com\/2020\/admins-heads-up-another-patch-tuesday-security-hole-has-a-public-exploit\/\" rel=\"noopener nofollow\" target=\"_blank\">Exchange Server<\/a>. That latter vulnerability is particularly vexing because anyone who can get access to any Exchange account on your server can take over Exchange. Seems that somebody forgot to delete hard-coded keys.<\/p>\n<p>We\u2019re looking into a report that Win10 version 1903 running Hyper-V is <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/windows-10-running-hyper-v-bsod-issue\/#post-2170527\" rel=\"noopener nofollow\" target=\"_blank\">throwing \u201cSynthetic_Watchdog_Timeout\u201d errors<\/a>. There are unconfirmed reports that there will be a fix in late March.<\/p>\n<p>There seems to be a way to <a href=\"https:\/\/www.askwoody.com\/2020\/is-there-a-way-to-cheat-pause-update\/\" rel=\"noopener nofollow\" target=\"_blank\">cheat the 35-day \u201cPause updates\u201d limitation<\/a> imposed in Win10 version 1903 and 1909. In a nutshell, if you tell Windows to Resume Updates, then unplug the computer from the internet, you may be able to reboot and get 35 more days paused, without installing the outstanding updates. In addition, @abbodi86 has a more complex but apparently <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/is-there-a-way-to-cheat-pause-update\/#post-2170432\" rel=\"noopener nofollow\" target=\"_blank\">foolproof way<\/a> to wipe out the 35 day limitation.<\/p>\n<p><em>Join the patch watch <\/em><a href=\"https:\/\/www.askwoody.com\/2020\/where-we-stand-with-the-feb-2020-microsoft-patches\/\" rel=\"noopener nofollow\" target=\"_blank\"><em>on AskWoody.com<\/em><\/a><em>.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-patch-alert-february-2020-patches-bring-fire-and-ice-but-seem-to-have-settled-finally.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security14-100734743-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 26 Feb 2020 09:44:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>The real stinker this month, KB 4524244, rolled out the automatic update chute for four full days until Microsoft yanked it \u2013 leaving a trail of wounded PCs, primarily HP machines, in its wake. The other big-time bug in this month\u2019s patches, a race condition in the KB 4532693 Win10 version 1903 and 1909 cumulative update installer, hasn\u2019t been officially acknowledged by Microsoft outside of a blog post. But at least it\u2019s well known and understood.<\/p>\n<p>Folks running SQL Server and Exchange Server networks need to get patched right away.<\/p>\n<h2><strong>Win10 UEFI update KB 4524244 blockages<\/strong><\/h2>\n<p>Patch Tuesday brought KB 4524244 for Windows 10 owners, a bizarre single-purpose patch apparently directed at one specific UEFI bootloader. I\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3528302\/the-mess-behind-microsoft-s-yanked-uefi-patch-kb-4524244.html\" rel=\"noopener\" target=\"_blank\">talked about it last week<\/a>.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3216425\/microsoft-patch-alert-february-2020-patches-bring-fire-and-ice-but-seem-to-have-settled-finally.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,13764,714,10525],"class_list":["post-17830","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-pcs","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17830"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17830\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17830"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}