Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Update rollup includes a security update for Windows Embedded Compact 2013 (December 2018)


View products that this article applies to.

Summary

An update rollup is available for Windows Embedded Compact 2013. This rollup resolves the security issues that are described in the following article:

CVE-2018-0886 | CredSSP Remote Code Execution Vulnerability

Before you install this update, the default value of the AllowEncryptionOracle registry key is 2 (Vulnerable) (see KB 4457498 for more information). After you install this update, the default value is changed from Vulnerable to Mitigated. These changes will require a restart of the affected systems. By default, after this update is installed, patched clients can't communicate with unpatched servers.

↑ Back to the top


Software update information

Download information

The Windows Embedded Compact 2013 monthly update for December 2018 is now available from Microsoft. To download this update, go to Microsoft OEM Online or the Device Partner Center (DPC).

Prerequisites

This update is supported only if all previously issued updates for this product have also been installed.

Restart requirement

After you apply this update, you must perform a clean build of the whole platform. To do this, use one of the following methods:

  • On the Build menu, select Clean Solution, and then select Build Solution.
  • On the Build menu, select Rebuild Solution.

You don't have to restart the computer after you apply this software update.

Update replacement information

This update doesn't replace any other updates.

↑ Back to the top


Status

Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section. 

↑ Back to the top


File Information

File nameFile sizeDateTimePath
Common.reg549,54505-Dec-201823:03Public\Common\Oak\Files
Credssp.lib223,43614-Dec-201805:44Public\Common\Oak\Lib\Armv7\Checked
Tspkg.lib554,64614-Dec-201805:44Public\Common\Oak\Lib\Armv7\Checked
Credssp.lib244,21014-Dec-201805:43Public\Common\Oak\Lib\Armv7\Debug
Tspkg.lib647,40614-Dec-201805:43Public\Common\Oak\Lib\Armv7\Debug
Credssp.lib230,14214-Dec-201805:44Public\Common\Oak\Lib\Armv7\Retail
Tspkg.lib535,53214-Dec-201805:44Public\Common\Oak\Lib\Armv7\Retail
Credssp.lib239,10014-Dec-201805:44Public\Common\Oak\Lib\X86\Checked
Tspkg.lib616,67414-Dec-201805:44Public\Common\Oak\Lib\X86\Checked
Credssp.lib224,47414-Dec-201805:43Public\Common\Oak\Lib\X86\Debug
Tspkg.lib535,39414-Dec-201805:43Public\Common\Oak\Lib\X86\Debug
Credssp.lib244,27414-Dec-201805:44Public\Common\Oak\Lib\X86\Retail
Tspkg.lib594,22214-Dec-201805:44Public\Common\Oak\Lib\X86\Retail

↑ Back to the top


Keywords: kbsecvulnerability, kbsecurity, kbsecreview, kbsecbulletin, kbmustloc, kblangall, kbbug, kbsurveynew, kb, atdownload, CI95358, kbHotfixAuto, kbfix

↑ Back to the top

Article Info
Article ID : 4479295
Revision : 10
Created on : 1/4/2019
Published on : 1/8/2019
Exists online : False
Views : 137