Threat Response – Patches available for multiple critical vulnerabilities in Microsoft Windows



On Tuesday January 11th, Microsoft published a number of patches for multiple security flaws as part of “Patch Tuesday”. Northwave has informed you of this in a previous Treat Response. Microsoft has indicated[1] that this update can cause problems in certain situations, causing domain controllers to go into a boot-loop, IPSEC connections to fail, or servers to respond slowly. The security updates for Windows Server 2012 R2, Windows Server 2019 and Windows Server 2022 have been withdrawn by Microsoft[2].

Our advice regarding these security patches remains the same: When Microsoft makes the new patches available we recommend to install them as soon as possible.

Northwave will monitor developments around these vulnerabilities. When possible, we will add detection rules around these vulnerabilities to the Northwave Detection Platform. We will reach out to you again if there are important updates, including if the threat posed by this activity increases. If you have any questions or require any additional information please reach out to us by phone or email.

E-mail: [email protected] Do you have an incident right now? Call our CERT number: +31 (0)85 043 7909Disclaimer applies, see below.




Northwave has made every effort to make this information accurate and reliable. However, the information provided is without warranty of any kind and its use is at the sole risk of the user. Northwave does not accept any responsibility or liability for the accuracy, content, completeness, legality or reliability of the information provided. We shall not be liable for any loss or damage of whatever nature, direct or indirect, consequential or other, whether arising in contract, tort or otherwise, which may arise as a result of your use of, or inability to use, this information or any additional information provided by us in direct or indirect relation to the information provided here.