KB5008218: Windows Server 2019 Security Update (December 2021)
A crafted request to the Internet Storage Name Service can give an attacker code execution on any Windows iSNS server.
An attacker who can reach the iSNS Server endpoint on a Windows host with the role installed can send a crafted request and execute code as the iSNS service. From there the attacker can manipulate iSCSI discovery (redirecting initiators to attacker-controlled targets), harvest credentials, or pivot to the storage fabric the iSNS server coordinates.
iSNS (Internet Storage Name Service) is the directory protocol iSCSI uses to discover and manage iSCSI targets — used in storage networks that rely on iSCSI for block-level storage. The Windows iSNS Server has a boundary error in how it parses incoming iSNS requests; a crafted request triggers memory corruption and lets an attacker execute code in the iSNS service context.
Probably yes if any of these apply:
Affected OS versions
A datacentre uses iSCSI for SAN storage, with a Windows-based iSNS server coordinating discovery. An attacker who reaches the storage management network sends a crafted iSNS request and lands code in the iSNS service. From that pivot they can redirect storage discovery and attack the SAN itself.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5008218Manual remediation steps
Prerequisites
Estimated time
20–40 minutes per server (download + install + reboot)
Reboot required
Yes — install the cumulative update and reboot the server before the fix is active.
Steps
1. Confirm the server is missing the patch
Get-HotFix -Id KB5008218 -ErrorAction SilentlyContinue
2. Install the update — pick one channel
Windows Update / WSUS (preferred):
UsoClient ScanInstallWait
Manual download (offline / air-gapped):
3. Reboot
Restart-Computer -Force
Verification
Get-HotFix -Id KB5008218
[System.Environment]::OSVersion.Version
Rollback
wusa.exe /uninstall /kb:5008218 /quiet /norestart
Notes
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.