Microsoft released security and non-security updates for all supported client and server versions of the Windows operating system on the August 2022 Patch Day.
The updates are available already via Windows Update and other update management services. While they do get installed automatically on most Home systems eventually, some administrators may want to download them as early as possible. All of the security updates that Microsoft releases are cumulative; they include previous updates.
Our patch overview for the Windows August 2022 Patch Tuesday is created as a reference for system administrators and home users alike. It lists important information about the released patches, includes links to support pages and direct downloads, lists known issues and includes a listing of non-security updates that Microsoft released.
Tip: check out the July 2022 Windows Update overview for last month's releases.
The following Excel spreadsheet includes the released security updates for Windows and other company products. Just download it with a click on the following link: Microsoft Windows security updates august 2022
Windows 7 SP1 and Windows Server 2008 R2
Windows 8.1 and Windows Server 2012 R2
Windows 10 version 20H2, 21H1 and 21H2
2022-08 Security Update for Windows 11, Windows 10 Version 21H1, Windows Server, version 20H2, Windows 10 Version 20H2, Windows 10 Version 2004, Windows 10 Version 1909, Windows 10 Version 1903, Windows Server 2019, Windows 10 Version 1809, Windows Server 2016, Windows 10 Version 1607, Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows Embedded 8 Standard, and Windows Server 2012 (KB5012170)
2022-08 Cumulative Security Update for Internet Explorer (KB5016618)
2022-08 Cumulative Update for Windows 10 Version 1507 (KB5016639)
2022-08 Security Monthly Quality Rollup for Windows Server 2008 (KB5016669)
2022-08 Security Only Quality Update for Windows Server 2008 (KB5016686)
2022-08 Security Only Quality Update for Windows Embedded 8 Standard and Windows Server 2012 (KB5016684)
2022-08 Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012 (KB5016672)
2022-08 Cumulative Update for Windows Server 2016 and Windows 10 Version 1607 (KB5016622)
2022-08 Cumulative Update for Windows Server 2019 and Windows 10 Version 1809 (KB5016623)
2022-08 Cumulative Update for Microsoft server operating system version 21H2 for x64-based Systems (KB5016627)
2022-08 Servicing Stack Update for Windows Server 2016 and Windows 10 Version 1607 (KB5017095)
Windows 7 SP1 and Windows Server 2008 R2
Windows 8.1 and Windows Server 2012 R2
Windows 10 versions 20H2, 21H1 and 21H2
If the issue persists, update the print driver for your device.
ADV 990001 -- Latest Servicing Stack Updates
2022-08 Cumulative Update for .NET Framework 3.5 and 4.8 for Windows 10 Version 21H1, Windows Server, version 20H2, Windows 10 Version 20H2, Windows 10 Version 2004, Windows 10 Version 1909, Windows 10 Version 1903, Windows 10 Version 1809, and Windows 10 Version 1607 (KB5015730)
2022-08 Security and Quality Rollup for .NET Framework 3.5.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2 (KB5016738)
2022-08 Security and Quality Rollup for .NET Framework 3.5, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Embedded 8 Standard and Windows Server 2012 (KB5016739)
2022-08 Security and Quality Rollup for .NET Framework 3.5, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 8.1 and Windows Server 2012 R2 (KB5016740)
2022-08 Security and Quality Rollup for .NET Framework 2.0, 3.0, 4.6.2 for Windows Server 2008 (KB5016741)
2022-08 Cumulative Update for .NET Framework 4.8 for Windows Server 2016 and Windows 10 Version 1607 (KB5016373)
2022-08 Cumulative Update for .NET Framework 3.5, 4.7.2 and 4.8 for Windows Server 2019 and Windows 10 Version 1809 (KB5016737)
You find Office update information here.
Unmanaged Windows devices are configured to download important security updates automatically. While it is possible to make changes to the default configuration, most updates that fall into the group are downloaded automatically.
Organizations may use update management systems such as WSUS to distribute updates.
Do the following to run a manual check for updates:
Below are resource pages with direct download links, if you prefer to download the updates to install them manually.
Windows 8.1 and Windows Server 2012 R2
Thanks, Ghacks.net/Martin Brinkman for helping me comprehend what I was doing while I was updating, to the Windows 10 pro version 21H2, O.S. build 19044.1889
After running the Patch Tuesday changes for my Windows 10 x64 home laptop, Belarc shows I am at 21H2 19044.1889 and confirmed by WINVER.
Interesting; I’d never thought to check build numbers in Belarc after updating (or anywhere else, for that matter).
Typically, Belarc doesn’t update its database with new Patch Tuesday updates until Wednesday afternoon at the earliest (US Pacific Time), and sometimes not until Thursday. Unless there is some super-critical, widely exploited zero-day vulnerability that’s being patched, I usually hold off on updating *at least* until Belarc has updated its database, and if there are reports of update “issues” that might affect me, for longer than that.
But Belarc Advisor is a useful little utility. I maintain a small depth of versioned backups of the computer profiles it generates using AutoVer. I run Belarc just before I update, and once again after I update, and if it doesn’t give me a clean bill of health after updating and I suspect a false positive, well, I have “before” and “after” profiles to send to Belarc’s engineers. (Plus, I appreciate being reminded about stuff like my Pale Moon Silverlight plug-in’s being end-of-life and insecure!)
Heh newer system = more vulnerabilities ;) As usual. Interesting :P
Just look at the number of “Remote Code Execution Vulnerability” bugs! The list just keeps on growing! Every version of Windows is full of these.
Whoa, that’s a whole lot of critical issues again for every Windows version… Kinda makes you bummed out, knowing that you’ve been sailing with a boat smack full of holes for a few weeks again.
I suspect that at some point Win7 automatically become less insecure due to small market share and lesser reasons to attack it. And win11 will eventually become main target for hackers.
I suspect that at some point Win7 automatically become less insecure due to small market share and lesser reasons to attack it. And win11 will eventually become main target for hackers.
No, because a range of exploits working on newer Windows versions will also work on Windows 7.
Arguable. New “hacker” stuff most likely will require windows to support modern and very high level frameworks, which obviously wont work on Win7. Resulting in “not a valid win32 application” or “nonexistent exe endpoint” error messages.
Makes me wish Microsoft does extend support for Windows 7 for another 3 years…
(Remove … to make the link work)
https:/…/www.ghacks.net/2022/07/15/it-looks-as-if-microsoft-could-extend-windows-7-support-by-three-years/
Even if appointed fact will not happen. POS version is supported up to late 2024.
When the internet Explorer removal official Microsoft tool?
Thanks once again for all the hard work.
I haven’t seen any indication that Microsoft is aware that July updates broke Windows Media Center by installing a broken ehtrace.dll since that was not listed as a known problem last month, and August’s update did not address or repair the problem (for those of us still using such an old application).
I have configured a day delay before installing updates.
I was checking to see if it checked for updates today, and looked at the update history. It installed an update KB5012170 yesterday.
Interestingly, my computer was acting weirdly and crashed yesterday. I never saw evidence that it downloaded the update, or warned of a reboot.
I running 21H1. It didn’t install KB5016616 yet.
No issues after installing the Monthly Rollup (KB5016681) on two Windows 8.1 Pro desktops. The End of Support (EOS) notification tasks remain disabled (as reported in last month’s July updates).
The Security update for Secure Boot DBX (KB5012170) did show up in Windows Update. But I don’t use or need the feature so I did not install it (instead right click and hide it).
Save my name, email, and website in this browser for the next time I comment.
Please click on the following link to open the newsletter signup page: Ghacks Newsletter Sign up
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.