Update KB5013943 fixes screen flickering and problems with .NET apps on Windows 11
Microsoft has just rolled out update KB5013943 for Windows 11 with security updates, improvements, and fixes for screen flickering in Safe Mode and an issue that prevented some .NET 3.5 applications from opening.
KB5013943 is a required cumulative update because it contains the May 2022 Patch Tuesday security updates for vulnerabilities discovered in previous months.
Windows 11 users can install this update by going to Settings > Windows Update and clicking the Check for Update button. Alternatively, you can also download update KB5013943 through the Microsoft Update Catalog.
What's New in Windows 11 Update KB5013943?
After installing update KB5013943, the Windows 11 version number will change to 22000.675.
KB5013943 includes about 27 improvements and bug fixes, 5 notable issues fixed are listed below:
- Microsoft fixed an issue that prevented .NET Framework 3.5 applications from opening. Only applications that used Windows Communication Foundation (WCF) and Windows Workflow (WWF) components will experience this issue.
- Microsoft has fixed an issue that causes your screen to flicker if you start Windows in Safe Mode.
- Microsoft fixed an issue that caused video subtitles to be partially cropped or incorrectly aligned.
- If you align your taskbar to the left, Windows 11 will display the temperature above the weather icon.
- The minimize, maximize and close buttons should now work as expected when using an application window.
New zero-day vulnerability patch in all versions of Windows
In the May 2022 Patch Tuesday update, Microsoft also addressed the Windows LSA spoofing zero-day vulnerability that is being actively exploited. An attacker could abuse this vulnerability to exploit remotely to force domain controllers to authenticate them through the Windows NT LAN Manager (NTLM) security protocol.
LSA (short for Local Security Authority) is a protected subsystem of Windows whose task is to enforce local security policies and authenticate local and remote login users.
The new vulnerability is tracked under code CVE-2022-26925 and reported by Raphael John of Bertelsmann Printing Corporation. It can generate a new attack vector for the PetitPotam NTLM campaign.
CVE-2022-26925 affects all versions of Windows, including client and server platforms, starting with Windows 7 and Windows Server 2008 through to Windows 11 and Windows Server 2022.
Besides CVE-2022-26925, Microsoft also patched two other vulnerabilities including Windows Hyper-V Denial of Service (CVE-2022-22713) and Magnitude Simba Amazon Redshift ODBC Driver (CVE-2022-29972) in Patch Tuesday update May 2022.
You should read it
- Microsoft releases new Patch Tuesday update for Windows 10
- Turn off the Win 10 update, stop Windows 10 from updating automatically
- Do not rush to update Patch Tuesday for November 2021 because it causes printer errors on Windows 10 again
- Steps to turn off Windows 11 Update, How to stop updating Windows 11
- Microsoft releases update KB5006746 to fix up to 64 errors on Windows 11
- How to update Win 7, update Windows 7 to the latest version
- How to hide Windows Update on Windows 10
- This is the last update of Windows 7, what's special?
- Chrome, Edge and Firefox cannot be opened after updating Windows 10, 11
- Windows Update crashes, this is what you need to do
- The last update of Windows 7 had an error, turning the desktop black
- Windows Update Blocker 1.6 - Download Windows Update Blocker here
Maybe you are interested
How to Enable and Disable Tabs in File Explorer on Windows 11
5 macOS Sequoia Features Not Available on Windows 11
Why does Windows operating system have such a bad reputation?
Quickly fix Unmountable Boot Volume error on Windows 10/11
15 safe software and application download websites for Windows
How to Fix Clipboard History Error in Windows 11 Latest Update