Windows 8.1 Professional Edition Patch Details
Patch Name Windows8.1-kb4054522-x86.msu
Patch Description 2017-12 Security Only Quality Update for Windows 8.1 for x86-based Systems (KB4054522)
Bulletin Id MS17-DEC1
Bulletin Title Security Update for Microsoft Windows Rollups and Security Only Updates (KB4054519)
Severity Important
Location Path Windows8.1-kb4054522-x86.msu
Bulletin Summary A remote code execution vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could execute code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to run a specially crafted application against an RPC server which has Routing and Remote Access enabled. Routing and Remote Access is a non-default configuration; systems without it enabled are not vulnerable. The security update addresses the vulnerability by correcting how the Routing and Remote Access service handles requests.
Superceding Bulletin Id None
Patch Release Date Dec 12, 2017

Affected Product Information

Product Name Service Pack Name
Windows 8.1 Enterprise EditionWindows 8.1 Gold
Windows 8.1 Home Basic EditionWindows 8.1 Gold
Windows 8.1 Home Premium EditionWindows 8.1 Gold
Windows 8.1 Professional EditionWindows 8.1 Gold
Windows 8.1 Starter EditionWindows 8.1 Gold
Windows 8.1 Ultimate EditionWindows 8.1 Gold
Update 1 for Windows 8.1 and Server 2012 R2 Windows 8.1 Update 1
Windows 8.1Windows 8.1 Gold
Monthly Quality Rollup for WindowsMonthly Quality Rollup for Windows DEC17
Monthly Quality Rollup for WindowsMonthly Quality Rollup for Windows JAN18
Monthly Quality Rollup for WindowsMonthly Quality Rollup for Windows FEB18
Monthly Quality Rollup for WindowsMonthly Quality Rollup for Windows MAR18
Monthly Quality Rollup for WindowsMonthly Quality Rollup for Windows APR18
Monthly Quality Rollup for WindowsMonthly Quality Rollup for Windows MAY18

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.