Recommended way to fix vulnerabilities and CVE in Microsoft Windows Server 2019 Standard Evaluation

Vikash Kumar Chaudhary 21 Reputation points
2022-11-18T08:27:04.13+00:00

Hello Folks,

I am using Microsoft Windows Server 2019 Standard Evaluation .

Recently, scanned this server and found the following vulnerabilities:

Critical count : 4

High count : 5

Medium count : 9

But the catch here is that in each critical count vulnerability there are multiple CVE
261709-capture1.png

So, inspite of having 4 crititical vulnerability , I have 190 CVE vulnerability.

What is the recommended way to fix all these vulnerabilities?

Am I supposed to resolve each CVE separately or is there any other method .

Note: I am using Microsoft Catalog Update. It makes one package update manually. But I am facing an issue over there.
261833-capture2.png

Please help me to resolve these issues.

Thanks.

Windows Server 2019
Windows Server 2019
A Microsoft server operating system that supports enterprise-level management, data storage, applications, and communications.
2,672 questions
Windows Server
Windows Server
A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.
9,550 questions
0 comments No comments
{count} votes

Accepted answer
  1. Dave Patrick 354.3K Reputation points MVP
    2022-11-20T18:40:37.967+00:00

    June 14, 2022—KB5014692 (OS Build 17763.3046)
    August 9, 2022—KB5016623 (OS Build 17763.3287)
    September 13, 2022—KB5017315 (OS Build 17763.3406)
    July 12, 2022—KB5015811 (OS Build 17763.3165)

    Updates are now cumulative so the current monthly update contains new fixes plus all of those from previous monthly updates. So you're good to go. "update is not applicable" is normal and expected behavior when trying to install an older build rollup.

    --please don't forget to upvote and Accept as answer if the reply is helpful--


1 additional answer

Sort by: Most helpful
  1. Dave Patrick 354.3K Reputation points MVP
    2022-11-18T13:51:25.163+00:00

    What is the recommended way to fix all these vulnerabilities?

    In general patch it fully.

    As to the "not applicable" what is the current build number?