Microsoft has fixed a bug that affects many versions of Windows and Windows Server that are running SSL / TLS Handshake failed.
Those who encounter the bug see a SEC_E_ILLEGAL_MESSAGE notification pop up in apps trying to connect to servers.
We are addressing an issue that may affect some types of Secure Sockets Layer (SSL) and Transport Layer Security (TLS (Opens in a new tab)) links. Microsoft said in the newspaper Advertising (Opens in a new tab).
Multiple versions affected
Affected versions include Windows 11 (Opens in a new tab) 22H2; Windows 11 21H2; Windows 10 21H2; Windows 10 21H1; Windows 10 20H2; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 10 Enterprise 2015 LTSB; Windows 8.1 operating system; and Windows 7 SP1.
for servers, the affected versions include Windows Server 2022; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; and Windows Server 2008 R2 SP1.
This is an out-of-band update, which means it will not be automatically deployed via Windows Update, Windows Update for Business, or Windows Server Update Services (WSUS).
Alternatively, users who are interested in choosing to update need to head to File Microsoft Update Catalog (Opens in a new tab) and manually add them to either Microsoft Endpoint Configuration Manager or Windows Server Update Services (WSUS).
Microsoft is no stranger to out-of-band updates. The last time we got such an update was in May 2022, when the company fixed an issue that prevented apps downloaded from the Windows Store from running properly. endpoints.
but, Computer (Opens in a new tab) I discovered that after installing the patch, the Cluster service might fail to start. In this case, this happens because an update to the PnP class drivers used by the service removed the cluster network driver.
The fix is still in the works for Windows 10 2016 LTSB, Windows Server 2016, and Windows 10 2015 LTSB.