KB5017367: Windows Server 2012 R2 Security Update (September 2022)
A crafted IKE / IPsec packet can give an attacker SYSTEM-level code execution on any Windows Server with IPsec configured.
An attacker who can reach UDP 500 or UDP 4500 on a Windows host with IPsec / IKE configured — and those ports are exposed on the public internet for any server acting as a VPN endpoint — can send a crafted packet and execute code as SYSTEM. No credentials, no user interaction. IKE RCEs are particularly dangerous because the affected hosts sit at the network perimeter.
The Windows IKE (Internet Key Exchange) and AuthIP IPsec Keying Modules service negotiates IPsec security associations — the key-exchange foundation behind site-to-site VPNs, Always-On VPN, and DirectAccess. The service listens on UDP 500 and UDP 4500 on any host with IPsec configured. A flaw in how IKE / IPsec processes crafted IP packets when IKE and AuthIP IPsec Keying Modules are active in the IKE packet handler lets an attacker corrupt memory and execute code in the SYSTEM context.
Probably yes if any of these apply:
Affected OS versions
A retailer's site-to-site VPN endpoint sits on the public internet with UDP 500/4500 open — the standard configuration. An attacker scans for IKEv2 responders, finds the endpoint, sends a crafted packet, and lands SYSTEM on the VPN concentrator. From there they have an authenticated route through the VPN tunnel into the corporate network the VPN was supposed to protect.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5017367Manual remediation steps
Check whether IPsec / IKE is in use
The IKE and AuthIP IPsec Keying Modules service must be active for this CVE to be reachable:
Get-Service IKEEXT | Select-Object Name, Status, StartType
If the service is stopped or disabled and IPsec is not in use, exposure is minimal. Patch on the standard cadence.
Prerequisites
Estimated time
20–40 minutes per server (download + install + reboot)
Reboot required
Yes — install the cumulative update and reboot the server before the fix is active.
Steps
1. Confirm the server is missing the patch
Get-HotFix -Id KB5017367 -ErrorAction SilentlyContinue
2. Install the update — pick one channel
Windows Update / WSUS (preferred):
UsoClient ScanInstallWait
Manual download (offline / air-gapped):
3. Reboot
Restart-Computer -Force
Verification
Get-HotFix -Id KB5017367
[System.Environment]::OSVersion.Version
Rollback
wusa.exe /uninstall /kb:5017367 /quiet /norestart
Notes
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.