Microsoft Releases August 2024 Patch Tuesday Updates for Windows 11 and Windows 10

Published: Aug 14, 2024

Windows 11 2022 Update

SHARE ARTICLE

Key Takeaways:

  • Microsoft released the August 2024 Patch Tuesday updates, addressing 90 vulnerabilities, including seven critical ones, such as remote code execution and privilege escalation flaws.
  • The August 2024 update introduces the ability for users to drag app shortcuts from the Start menu to the Taskbar in Windows 11.
  • Windows 11 version 22H2 Home and Pro editions will reach end of support on October 8, 2024.

Microsoft has released the August 2024 Patch Tuesday updates for Windows 11 and Windows 10. This month, Microsoft addressed 90 new vulnerabilities in Windows, Office, Azure, Co-Pilot, and other components.

Microsoft is reminding customers that the Home and Pro editions of Windows 11 version 22H2 will reach end of support on October 8. The company recommends users to upgrade to the latest version of Windows 11 to continue receiving security and non-security updates.

August 2024 Patch Tuesday Updates fix 90 vulnerabilities

According to the Zero Day Initiative, Microsoft has released a total of 90 security patches, with fixes for seven critical vulnerabilities. Here’s a list of the most important security flaws you should know about this month:

  • CVE-2024-38189: This is a Microsoft Project remote code execution vulnerability with an 8.8 CVSS rating. It affects organizations that have disabled the VBA Macro Notification Settings on their computer systems. This flaw requires an attacker to execute arbitrary code remotely by tricking a user into opening a malicious Microsoft Office Project file.
  • CVE-2024-38178: This is a memory corruption vulnerability in Windows Scripting Engine memory or Script Host. It requires the hacker to convince the victim to use Microsoft Edge in Internet Explorer Mode and click on a specially crafted URL.
  • CVE-2024-38213: This zero-day flaw enables attackers to bypass Windows Mark of the Web (MoTW) security protections. Hackers could exploit this vulnerability to inject malicious files and Web content into corporate networks.
  • CVE-2024-38193: This is a 7.8-rated Windows Ancillary Function Driver for WinSock vulnerability that could enable cybercriminals to gain system-level privileges.
  • CVE-2024-21302: This is a Windows Secure Kernel Mode elevation of privilege vulnerability with a 6.7 CVSS rating.
  • CVE-2024-38199: This is a 9.8-rated remote code execution vulnerability that affects the Windows Line Printer Daemon (LPD) Service.

Here’s a full list of CVEs Microsoft released this month:

ProductImpactMax SeverityArticleDownloadDetails
Windows Server 2022Elevation of PrivilegeImportant5040437Security UpdateCVE-2024-38186
Windows Server 2019 (Server Core installation)Elevation of PrivilegeImportant5040430Security UpdateCVE-2024-38186
Windows Server 2019Elevation of PrivilegeImportant5040430Security UpdateCVE-2024-38186
Windows 10 Version 1809 for ARM64-based SystemsElevation of PrivilegeImportant5040430Security UpdateCVE-2024-38186
Windows 10 Version 1809 for x64-based SystemsElevation of PrivilegeImportant5040430Security UpdateCVE-2024-38186
C SDK for Azure IoTRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38158
Azure IoT Hub Device Client SDKRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38157
Windows 11 Version 24H2 for x64-based SystemsInformation DisclosureImportant5041571Security UpdateCVE-2024-38155
Windows 11 Version 24H2 for ARM64-based SystemsInformation DisclosureImportant5041571Security UpdateCVE-2024-38155
Windows 11 Version 23H2 for x64-based SystemsInformation DisclosureImportant5041585Security UpdateCVE-2024-38155
Windows 11 Version 23H2 for ARM64-based SystemsInformation DisclosureImportant5041585Security UpdateCVE-2024-38155
Windows 10 Version 22H2 for 32-bit SystemsInformation DisclosureImportant5041580Security UpdateCVE-2024-38155
Windows 10 Version 21H2 for x64-based SystemsRemote Code ExecutionImportant5041580Security UpdateCVE-2024-38152
Windows 10 Version 21H2 for ARM64-based SystemsRemote Code ExecutionImportant5041580Security UpdateCVE-2024-38152
Windows 10 Version 21H2 for 32-bit SystemsRemote Code ExecutionImportant5041580Security UpdateCVE-2024-38152
Windows 11 version 21H2 for ARM64-based SystemsRemote Code ExecutionImportant5041592Security UpdateCVE-2024-38152
Windows 11 version 21H2 for x64-based SystemsRemote Code ExecutionImportant5041592Security UpdateCVE-2024-38152
Windows Server 2022 (Server Core installation)Remote Code ExecutionImportant5041160Security UpdateCVE-2024-38152
Windows Server 2016Denial of ServiceImportant5041773Security UpdateCVE-2024-38146
Windows 10 Version 1607 for x64-based SystemsDenial of ServiceImportant5041773Security UpdateCVE-2024-38146
Windows 10 Version 1607 for 32-bit SystemsDenial of ServiceImportant5041773Security UpdateCVE-2024-38146
Windows 10 for x64-based SystemsDenial of ServiceImportant5041782Security UpdateCVE-2024-38146
Windows 10 for 32-bit SystemsDenial of ServiceImportant5041782Security UpdateCVE-2024-38146
Windows Server 2022, 23H2 Edition (Server Core installation)Denial of ServiceImportant5041573Security UpdateCVE-2024-38146
Windows Server 2022Elevation of PrivilegeImportant5041160Security UpdateCVE-2024-38134
Windows Server 2019 (Server Core installation)Elevation of PrivilegeImportant5041578Security UpdateCVE-2024-38134
Windows Server 2012 (Server Core installation)Elevation of PrivilegeImportant5041851Monthly RollupCVE-2024-38127
Windows Server 2012Elevation of PrivilegeImportant5041851Monthly RollupCVE-2024-38127
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Elevation of PrivilegeImportant5041838Monthly RollupCVE-2024-38127
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Elevation of PrivilegeImportant5041823Security OnlyCVE-2024-38127
Windows Server 2008 R2 for x64-based Systems Service Pack 1Elevation of PrivilegeImportant5041838Monthly RollupCVE-2024-38127
Windows Server 2008 R2 for x64-based Systems Service Pack 1Elevation of PrivilegeImportant5041823Security OnlyCVE-2024-38127
Windows Server 2016 (Server Core installation)Elevation of PrivilegeImportant5041773Security UpdateCVE-2024-38127
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Information DisclosureImportant5041850Monthly RollupCVE-2024-38122
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Information DisclosureImportant5041847Security OnlyCVE-2024-38122
Windows Server 2008 for 32-bit Systems Service Pack 2Information DisclosureImportant5041850Monthly RollupCVE-2024-38122
Windows Server 2008 for 32-bit Systems Service Pack 2Information DisclosureImportant5041847Security OnlyCVE-2024-38122
Windows 10 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportant5041580Security UpdateCVE-2024-38117
Windows 10 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5041580Security UpdateCVE-2024-38117
Windows 11 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5041585Security UpdateCVE-2024-38117
Windows 11 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportant5041585Security UpdateCVE-2024-38117
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Remote Code ExecutionImportant5041850Monthly RollupCVE-2024-38114
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Remote Code ExecutionImportant5041847Security OnlyCVE-2024-38114
Windows Server 2008 for x64-based Systems Service Pack 2Remote Code ExecutionImportant5041850Monthly RollupCVE-2024-38114
Windows Server 2008 for x64-based Systems Service Pack 2Remote Code ExecutionImportant5041847Security OnlyCVE-2024-38114
Windows Server 2012 R2 (Server Core installation)SpoofingImportant5041828Monthly RollupCVE-2024-37968
Windows Server 2012 R2SpoofingImportant5041828Monthly RollupCVE-2024-37968
Windows Server 2019SpoofingImportant5041578Security UpdateCVE-2024-37968
Azure Health BotElevation of PrivilegeCriticalCVE-2024-38109
Windows 10 Version 1809 for ARM64-based SystemsElevation of PrivilegeImportant5041578Security UpdateCVE-2024-38223
Windows 10 Version 1809 for x64-based SystemsElevation of PrivilegeImportant5041578Security UpdateCVE-2024-38223
Windows 10 Version 1809 for 32-bit SystemsElevation of PrivilegeImportant5041578Security UpdateCVE-2024-38223
Microsoft Dynamics 365 (on-premises) version 9.1SpoofingImportant5041557Security UpdateCVE-2024-38211
CBL Mariner 2.0 x64grub2CBL-MarinerCVE-2022-3775
CBL Mariner 2.0 ARMgrub2CBL-MarinerCVE-2022-3775
CBL Mariner 1.0 x64grub2CBL-MarinerCVE-2022-3775
CBL Mariner 1.0 ARMgrub2CBL-MarinerCVE-2022-3775
Azure Linux 3.0 x64grub2CBL-MarinerCVE-2022-3775
Azure Linux 3.0 ARMgrub2CBL-MarinerCVE-2022-3775
Windows 10 Version 22H2 for 32-bit SystemsElevation of PrivilegeImportant5042320Security UpdateCVE-2024-38163
Windows 10 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5042320Security UpdateCVE-2024-38163
Windows 10 Version 21H2 for x64-based SystemsElevation of PrivilegeImportant5042320Security UpdateCVE-2024-38163
Windows 10 Version 21H2 for 32-bit SystemsElevation of PrivilegeImportant5042320Security UpdateCVE-2024-38163
Windows 11 version 21H2 for x64-based SystemsElevation of PrivilegeImportant5042321Security UpdateCVE-2024-38163
Windows Server 2022Elevation of PrivilegeImportant5042322Security UpdateCVE-2024-38163
Azure CycleCloud 8.6.1Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.6.2Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.5.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.4.2Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.4.1Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.4.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.3.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.2.1Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.2.2Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.1.1Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.1.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.0.2Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.0.1Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.6.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.0.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Azure CycleCloud 8.2.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38195
Microsoft Office LTSC 2021 for 64-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2024-38189
Microsoft Office LTSC 2021 for 32-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2024-38189
Microsoft Project 2016 (64-bit edition)Remote Code ExecutionImportant5002561Security UpdateCVE-2024-38189
Microsoft Project 2016 (32-bit edition)Remote Code ExecutionImportant5002561Security UpdateCVE-2024-38189
Microsoft 365 Apps for Enterprise for 64-bit SystemsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2024-38189
Microsoft 365 Apps for Enterprise for 32-bit SystemsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2024-38189
Microsoft Office 2019 for 64-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2024-38189
Microsoft Office 2019 for 32-bit editionsRemote Code ExecutionImportantClick to RunSecurity UpdateCVE-2024-38189
Windows Server 2016 (Server Core installation)Elevation of PrivilegeImportant5040434Security UpdateCVE-2024-38187
Windows Server 2016Elevation of PrivilegeImportant5040434Security UpdateCVE-2024-38187
Windows 10 Version 1607 for x64-based SystemsElevation of PrivilegeImportant5040434Security UpdateCVE-2024-38187
Windows 10 Version 1607 for 32-bit SystemsElevation of PrivilegeImportant5040434Security UpdateCVE-2024-38187
Windows Server 2022, 23H2 Edition (Server Core installation)Elevation of PrivilegeImportant5040438Security UpdateCVE-2024-38187
Windows 11 Version 23H2 for x64-based SystemsElevation of PrivilegeImportant5040442Security UpdateCVE-2024-38187
Windows 11 Version 23H2 for ARM64-based SystemsElevation of PrivilegeImportant5040442Security UpdateCVE-2024-38187
Windows 10 Version 22H2 for 32-bit SystemsElevation of PrivilegeImportant5040427Security UpdateCVE-2024-38187
Windows 10 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportant5040427Security UpdateCVE-2024-38187
Windows 10 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5040427Security UpdateCVE-2024-38187
Windows 11 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5040442Security UpdateCVE-2024-38187
Windows 11 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportant5040442Security UpdateCVE-2024-38187
Windows 10 Version 21H2 for x64-based SystemsElevation of PrivilegeImportant5040427Security UpdateCVE-2024-38187
Windows 10 Version 21H2 for ARM64-based SystemsElevation of PrivilegeImportant5040427Security UpdateCVE-2024-38187
Windows 10 Version 21H2 for 32-bit SystemsElevation of PrivilegeImportant5040427Security UpdateCVE-2024-38187
Windows 11 version 21H2 for ARM64-based SystemsElevation of PrivilegeImportant5040431Security UpdateCVE-2024-38187
Windows 11 version 21H2 for x64-based SystemsElevation of PrivilegeImportant5040431Security UpdateCVE-2024-38187
Windows Server 2022 (Server Core installation)Elevation of PrivilegeImportant5040437Security UpdateCVE-2024-38187
Windows 10 Version 1809 for 32-bit SystemsElevation of PrivilegeImportant5040430Security UpdateCVE-2024-38187
App InstallerSpoofingImportantRelease NotesSecurity UpdateCVE-2024-38177
Microsoft Outlook 2016 (64-bit edition)Remote Code ExecutionImportant5002626Security UpdateCVE-2024-38173
Microsoft Outlook 2016 (32-bit edition)Remote Code ExecutionImportant5002626Security UpdateCVE-2024-38173
Microsoft PowerPoint 2016 (64-bit edition)Remote Code ExecutionImportant5002586Security UpdateCVE-2024-38171
Microsoft PowerPoint 2016 (32-bit edition)Remote Code ExecutionImportant5002586Security UpdateCVE-2024-38171
Microsoft Office LTSC for Mac 2021Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38171
Azure Connected Machine AgentElevation of PrivilegeImportantRelease NotesSecurity UpdateCVE-2024-38162
Remote Desktop client for Windows DesktopRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38131
Microsoft OfficePLUSElevation of PrivilegeImportantRelease NotesSecurity UpdateCVE-2024-38084
Windows Server 2012 R2 (Server Core installation)Security Feature BypassModerate5039294Monthly RollupCVE-2024-38213
Windows Server 2012 R2Security Feature BypassModerate5039294Monthly RollupCVE-2024-38213
Windows Server 2012 (Server Core installation)Security Feature BypassModerate5039260Monthly RollupCVE-2024-38213
Windows Server 2012Security Feature BypassModerate5039260Monthly RollupCVE-2024-38213
Windows Server 2016 (Server Core installation)Security Feature BypassModerate5039214Security UpdateCVE-2024-38213
Windows Server 2016Security Feature BypassModerate5039214Security UpdateCVE-2024-38213
Windows 10 Version 1607 for x64-based SystemsSecurity Feature BypassModerate5039214Security UpdateCVE-2024-38213
Windows 10 Version 1607 for 32-bit SystemsSecurity Feature BypassModerate5039214Security UpdateCVE-2024-38213
Windows 10 for x64-based SystemsSecurity Feature BypassModerate5039225Security UpdateCVE-2024-38213
Windows 10 for 32-bit SystemsSecurity Feature BypassModerate5039225Security UpdateCVE-2024-38213
Windows Server 2022, 23H2 Edition (Server Core installation)Security Feature BypassModerate5039236Security UpdateCVE-2024-38213
Windows 11 Version 23H2 for x64-based SystemsSecurity Feature BypassModerate5039212Security UpdateCVE-2024-38213
Windows 11 Version 23H2 for ARM64-based SystemsSecurity Feature BypassModerate5039212Security UpdateCVE-2024-38213
Windows 10 Version 22H2 for 32-bit SystemsSecurity Feature BypassModerate5039211Security UpdateCVE-2024-38213
Windows 10 Version 22H2 for ARM64-based SystemsSecurity Feature BypassModerate5039211Security UpdateCVE-2024-38213
Windows 10 Version 22H2 for x64-based SystemsSecurity Feature BypassModerate5039211Security UpdateCVE-2024-38213
Windows 11 Version 22H2 for x64-based SystemsSecurity Feature BypassModerate5039212Security UpdateCVE-2024-38213
Windows 11 Version 22H2 for ARM64-based SystemsSecurity Feature BypassModerate5039212Security UpdateCVE-2024-38213
Windows 10 Version 21H2 for x64-based SystemsSecurity Feature BypassModerate5039211Security UpdateCVE-2024-38213
Windows 10 Version 21H2 for ARM64-based SystemsSecurity Feature BypassModerate5039211Security UpdateCVE-2024-38213
Windows 10 Version 21H2 for 32-bit SystemsSecurity Feature BypassModerate5039211Security UpdateCVE-2024-38213
Windows 11 version 21H2 for ARM64-based SystemsSecurity Feature BypassModerate5039213Security UpdateCVE-2024-38213
Windows 11 version 21H2 for x64-based SystemsSecurity Feature BypassModerate5039213Security UpdateCVE-2024-38213
Windows Server 2022 (Server Core installation)Security Feature BypassModerate5039227Security UpdateCVE-2024-38213
Windows Server 2022 (Server Core installation)Security Feature BypassModerate5039330Security Hotpatch UpdateCVE-2024-38213
Windows Server 2022Security Feature BypassModerate5039227Security UpdateCVE-2024-38213
Windows Server 2022Security Feature BypassModerate5039330Security Hotpatch UpdateCVE-2024-38213
Windows Server 2019 (Server Core installation)Security Feature BypassModerate5039217Security UpdateCVE-2024-38213
Windows Server 2019Security Feature BypassModerate5039217Security UpdateCVE-2024-38213
Windows 10 Version 1809 for ARM64-based SystemsSecurity Feature BypassModerate5039217Security UpdateCVE-2024-38213
Windows 10 Version 1809 for x64-based SystemsSecurity Feature BypassModerate5039217Security UpdateCVE-2024-38213
Windows 10 Version 1809 for 32-bit SystemsSecurity Feature BypassModerate5039217Security UpdateCVE-2024-38213
Azure Stack HubElevation of PrivilegeImportantRelease NotesSecurity UpdateCVE-2024-38201
Microsoft Teams for iOSSpoofingImportantRelease NotesSecurity UpdateCVE-2024-38197
Windows Server 2012 R2 (Server Core installation)Elevation of PrivilegeImportant5040456Monthly RollupCVE-2024-38191
Windows Server 2012 R2Elevation of PrivilegeImportant5040456Monthly RollupCVE-2024-38191
Windows Server 2012 (Server Core installation)Elevation of PrivilegeImportant5040485Monthly RollupCVE-2024-38191
Windows Server 2012Elevation of PrivilegeImportant5040485Monthly RollupCVE-2024-38191
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Elevation of PrivilegeImportant5040497Monthly RollupCVE-2024-38191
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Elevation of PrivilegeImportant5040498Security OnlyCVE-2024-38191
Windows Server 2008 R2 for x64-based Systems Service Pack 1Elevation of PrivilegeImportant5040497Monthly RollupCVE-2024-38191
Windows Server 2008 R2 for x64-based Systems Service Pack 1Elevation of PrivilegeImportant5040498Security OnlyCVE-2024-38191
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5040499Monthly RollupCVE-2024-38191
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5040490Security OnlyCVE-2024-38191
Windows Server 2008 for x64-based Systems Service Pack 2Elevation of PrivilegeImportant5040499Monthly RollupCVE-2024-38191
Windows Server 2008 for x64-based Systems Service Pack 2Elevation of PrivilegeImportant5040490Security OnlyCVE-2024-38191
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5040499Monthly RollupCVE-2024-38191
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5040490Security OnlyCVE-2024-38191
Windows Server 2008 for 32-bit Systems Service Pack 2Elevation of PrivilegeImportant5040499Monthly RollupCVE-2024-38191
Windows Server 2008 for 32-bit Systems Service Pack 2Elevation of PrivilegeImportant5040490Security OnlyCVE-2024-38191
Windows 10 for x64-based SystemsElevation of PrivilegeImportant5040448Security UpdateCVE-2024-38191
Windows 10 for 32-bit SystemsElevation of PrivilegeImportant5040448Security UpdateCVE-2024-38191
Windows Server 2012 R2 (Server Core installation)Remote Code ExecutionImportant5041770IE CumulativeCVE-2024-38178
Windows Server 2012 R2Remote Code ExecutionImportant5041770IE CumulativeCVE-2024-38178
Microsoft Visual Studio 2022 version 17.8Denial of ServiceImportantRelease NotesSecurity UpdateCVE-2024-38168
Microsoft Visual Studio 2022 version 17.10Denial of ServiceImportantRelease NotesSecurity UpdateCVE-2024-38168
Microsoft Visual Studio 2022 version 17.6Denial of ServiceImportantRelease NotesSecurity UpdateCVE-2024-38168
.NET 8.0Denial of ServiceImportant5042132Security UpdateCVE-2024-38168

Quality and experience updates

Microsoft has released the KB5041585 patch for users running Windows 11 versions 22H2 and 23H2. This update brings all the new features that were previously released in July’s Week D update. Users can now drag app shortcuts from the pinned area in the Start menu to the Taskbar. For Windows 11 version 24H2, Microsoft has released a new KB5041571 patch that lets users drag app shortcuts from the Start menu to the Taskbar.

For Windows 10 users, Microsoft released the KB5041580 patch that addresses the BitLocker recovery screen bug caused by the July 2024 Patch Tuesday updates. The company is also working to fix an issue that is currently preventing users from changing their profile pictures.

Windows Update testing and best practices

Organizations looking to deploy this month’s patches should conduct thorough testing before deploying them widely on production systems. That said, applying the patches widely shouldn’t be delayed longer than necessary as hackers start to work out how to weaponize newly reported vulnerabilities.

A best practice is to make sure you have backed up systems before applying updates. Every month, users experience issues with Windows updates that lead to systems not booting, application and hardware compatibility issues, or even data loss in extreme cases.

There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system, or files and folders on a granular basis.

SHARE ARTICLE