Interesting discussion from Michael Horowitz: When you run Windows Update on Windows 7 (I did not test other versions of Windows) it opens MANY connec
[See the full post at: Horowitz: Windows Update on Win7 is not secure]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Horowitz: Windows Update on Win7 is not secure
Home » Forums » Newsletter and Homepage topics » Horowitz: Windows Update on Win7 is not secure
- This topic has 46 replies, 21 voices, and was last updated 6 years, 7 months ago.
AuthorTopicViewing 17 reply threadsAuthorReplies-
WildBill
AskWoody PlusSeptember 24, 2018 at 5:14 pm #219403Windows 7: “Cortana, is that you?”
Bought a refurbished Windows 10 64-bit, currently updated to 22H2. Have broke the AC adapter cord going to the 8.1 machine, but before that, coaxed it into charging. Need to buy new adapter if wish to continue using it.
Wild Bill Rides Again... -
Seff
AskWoody Plus -
cesmart4125
AskWoody Lounger -
Seff
AskWoody Plus
-
-
-
anonymous
GuestSeptember 24, 2018 at 5:42 pm #219423I seem to remember from my wet brain database, not always to be trusted, that we had a similar in depth discussion about WU (WIN7) security over open ports using insecure protocols by design. This was less than a year ago but before Christmas. I am not sure how much of this is new information, or recovering ground already tread. It might take a while to find. If I do, I’ll link here.
-
PKCano
Manager -
anonymous
GuestSeptember 24, 2018 at 6:22 pm #219431@pkcano , possibly not for publication, edit as you see fit
Either my timeframe is wrong, my search terms are inadequate, or I’m flat out wrong. But I did find enough topic discussions that reminded me there is a period or group of subjects lost to the void around a year ago. As I am not on the inside loop, I do not know if the missing material was the result of an underpowered server reaching it’s limitations; or if there was material removed because it elicited attacks.
I do not need to know one way or the other, only hoping to jostle loose a remembered thought for you. I may be barking up the wrong tree in the wrong forest.
-
PKCano
Manager -
anonymous
GuestSeptember 24, 2018 at 11:03 pm #219488I apologize for suggesting this without finding it first. Thanks for the encouragement to search. I’ve run down the front page articles list in the time frame, but thought it was introduced in the lounge. So I dug into archived replies by likely candidates who would have been interested. I either have a blind spot, a false memory, or correctly suspect it was lost during a stressful time. In any case, I’ve chased the wild goose and gone hungry. The goose won.
-
-
-
-
-
The Surfing Pensioner
AskWoody Plus -
fernlady
AskWoody Lounger -
geekdom
AskWoody_MVPSeptember 24, 2018 at 6:19 pm #219434What is the work around?
Is it necessary to do a work around?
On permanent hiatus {with backup and coffee}
offline▸ Win10Pro 2004.19041.572 x64 i3-3220 RAM8GB HDD Firefox83.0b3 WindowsDefender
offline▸ Acer TravelMate P215-52 RAM8GB Win11Pro 22H2.22621.1265 x64 i5-10210U SSD Firefox106.0 MicrosoftDefender
online▸ Win11Pro 22H2.22621.1992 x64 i5-9400 RAM16GB HDD Firefox116.0b3 MicrosoftDefender -
anonymous
GuestSeptember 24, 2018 at 6:25 pm #219433 -
lurks about
AskWoody Lounger -
Charlie
AskWoody Plus
-
-
-
b
AskWoody_MVPSeptember 24, 2018 at 6:56 pm #219445WINDOWS UPDATE BUGS
The buggy nature of Windows Update on Windows 7 last got publicity when it would take half a day to figure out the missing patches. This month, it was shamed for failing to install the August and September monthly updates because it had failed to update itself first.
A bug fix to Windows Update (KB3177467) was issued in October of 2016, and a system without this fix ran fine until very recently, when Windows Update failed with a 0x8000FFFF error for many people. Woody Leonhard covered the details in Computerworld.
John Wilcox of Microsoft offered an explanation for the problem where he wrote “when we released the Windows 7 SP1 servicing stack update (KB3177467) it was marked ‘critical.’ ” Yet, on August 25, 2018, I tweeted about a Windows 7 system that installed all the available August 2018 patches and then, after the mandatory reboot, wanted to install KB3177467. Nothing said that KB3177467 was critical. I wondered why a two year old patch appeared after installing all the current patches. The 2016 patch was checked by default, but it looked and felt like a Windows Update bug, so I didn’t install it.That’s the trouble when you let users decide which updates to install: They guess wrong and it comes back to bite them, even if it is years later.
-
DrBonzo
AskWoody Plus
-
-
OscarCP
MemberSeptember 24, 2018 at 7:06 pm #219447Would this apply to anything offered as checked by Windows Update when one has WU set to “let me know but let me decide what and when to install”?
I understand from the previous discussion here (and, please, correct me if I’m wrong in this) that, being in Group B, when I download Win 7 updates (Security Only and IE11) from the Catalog, this is not a problem.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
PKCano
ManagerSeptember 24, 2018 at 7:22 pm #219449Would this apply to anything offered as checked by Windows Update when one has WU set to “let me know but let me decide what and when to install”?
The discussion applies to any updates delivered through the Windows built-in Windows Update mechanism, whether checked by default or checked by the user, no matter what their settings are.
Updating Windows (from Catalogue downloads) is not the same as updating through Windows Update
-
cesmart4125
AskWoody Lounger
-
-
-
Susan Bradley
ManagerSeptember 24, 2018 at 7:22 pm #219450In the back recesses of my mind the Windows updating process is digitally signed. The bits of the patches are put together based on these signed bits of code. If any patch doesn’t reorganize properly the operating system will throw out the bad bits and try again. “it can also be modified in-flight” Irrelevant and doesn’t matter. Even if bits are modified in flight Windows update on the client puts the bits together, checks the digital signature and as long as the check sums align up, it will stamp it as good code an install.
Remember the Flame malware and the resulting code signing cert/WSUS patching we all did a few years back? https://en.wikipedia.org/wiki/Flame_%28malware%29 The certificate process ensures we get good code.
Now as far as how bad windows update diagnostics is… well…
Susan Bradley Patch Lady/Prudent patcher
10 users thanked author for this post.
-
Susan Bradley
ManagerSeptember 24, 2018 at 7:26 pm #219453P.S. I ran that Windows 7 KB3177467 back when it came out. It’s been a recommended patch for 7 (and servers) for a long long time. http://wu.krelay.de/en/ has had it listed for many many months. Don’t beat up Microsoft over something that should have been installed a long time ago….other than it showcases that lack of trust of patching isn’t new.
Susan Bradley Patch Lady/Prudent patcher
-
OscarCP
MemberSeptember 24, 2018 at 7:46 pm #219457Susan Bradley: ” Don’t beat up Microsoft over something that should have been installed a long time ago….other than it showcases that lack of trust of patching isn’t new. ”
So, to be clear about the Patch Lady’s point, that might be a decisive one here: having installed KB3177467 back when, is one now quite free from the problem this thread is about?
And, if one has not install it yet, is it OK to go ahead and install it now? (First I must confess here that I am patched with all this year’s patches through August.)
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV1 user thanked author for this post.
-
Susan Bradley
ManagerSeptember 24, 2018 at 7:58 pm #219462KB3177467 is one of the updates that you probably installed it two years ago and never realized it.
If you had the dreaded slow scanning for updates, you installed probably a year ago and forgot about it. It’s safe to install and if you don’t have it now, you should have it now.
Try to install it, if you already have it installed, it will let you know that it’s already installed.
Susan Bradley Patch Lady/Prudent patcher
-
Susan Bradley
Manager -
Demeter
AskWoody LoungerSeptember 26, 2018 at 6:08 pm #219944Went through installed updates list back to 2016 and couldn’t find KB3177467 so thought I would download and install through MS. Started to download and then a window popped up with the message “This update does not apply to your computer.” Patched up through August 2018. No errors ever encountered. What gives? Win 7 Pro x64, SP1, i7-core Haswell
-
PKCano
Manager -
EP
AskWoody_MVP
-
-
-
-
Michael432
AskWoody_MVPSeptember 24, 2018 at 8:36 pm #219474Don’t beat up Microsoft over something that should have been installed a long time ago
Beating up seems fair. A 2 year old patch showed up after installing the usual August 2018 patches and rebooting. That looks like an error. Why was it not listed along with the other Aug patches? Why does it first show up 2 years late? If that’s not a bug, what is? Nothing said to an end user that it was critical, in fact there were no documentations updates to it for 2 years.
And, the heavy use of port 80 (at least 6 connections for a Windows Update session) is the main point. Seems fair to beat up MS for that too, whether HTTP is used for transmitting patches or for another purpose.
Get up to speed on router security at RouterSecurity.org and Defensive Computing at DefensiveComputingChecklist.com
1 user thanked author for this post.
-
Susan Bradley
Manager -
Susan Bradley
ManagerSeptember 24, 2018 at 10:10 pm #219485“Windows Update agent uses port 80 for HTTP and port 443 for HTTPS to obtain updates.”
You can block outbound port 80 and windows update will work just fine.
Susan Bradley Patch Lady/Prudent patcher
-
-
-
abbodi86
AskWoody_MVPSeptember 24, 2018 at 10:59 pm #219493With all due respect, didn’t we already discussed this similar subject?
https://www.askwoody.com/2018/microsoft-using-insecure-http-links-to-distribute-security-patches-through-the-update-catalog/do you think malware hackers would not have taken WU years ago if it was that insecure?
-
Microfix
AskWoody MVPSeptember 25, 2018 at 10:20 am #219573do you think malware hackers would not have taken WU years ago if it was that insecure?
Perhaps they already have since July 2015, Microsoft AI
Windows - commercial by definition and now function... -
Michael432
AskWoody_MVPSeptember 25, 2018 at 11:00 am #219584Similar topic, but not exactly the same. Still, it does show the mindset at Microsoft – secure transmission of data is not important. I hope to test Susan’s claim that you can block outgoing port 80 connections and Windows Update will still work… Even if true though, the bigger issue is about Microsoft themselves and whether the company deserves to be trusted.
Get up to speed on router security at RouterSecurity.org and Defensive Computing at DefensiveComputingChecklist.com
-
-
anonymous
GuestSeptember 24, 2018 at 11:04 pm #219492? says:
with all due respect please google “KB3177467 problem.” you will find many links that show people having problems installing the “update” since it was released. i chose not to install it then and have fully patched 5 windows 7 Pro 32bit installations (b style) current to September 11 without installing it. I downloaded it to linux and looked at the files and did not see anything untoward within. no digitrack (Diagnostic Tracking Service) or CEIP or get winx either. i will consider installing it in the future if need be. win 7 is on the way out soon anyway. tip of the hat to abbodi86 in post #219238 “how to [neuter] telemetry…” it took me much searching and time a few years ago to apply his method without the comprehensive guide he posted earlier today. i keep wondering why Microsoft spends so much time and money working to completely control windows7 when it is all but finished and causing customers so much lost time trying to keep it secure and operating in a satisfactory manner. call me naive. for example i was able to fully patch windows xp pro in under 4 minutes earlier today.
-
GoneToPlaid
AskWoody LoungerSeptember 25, 2018 at 3:04 pm #219659? says: with all due respect please google “KB3177467 problem.” you will find many links that show people having problems installing the “update” since it was released…
All of this was not due to the update itself, but instead was due to MS deliberately throttling Windows Update on Win7 computers. There is no other possible explanation since the issues occurred whether or not KB3177467 was installed, and since all of the issues instantly disappeared after Microsoft ended its GWX campaign.
1 user thanked author for this post.
-
-
OscarCP
MemberSeptember 25, 2018 at 12:11 am #219506Anonymous ( #219492 ): ” i keep wondering why Microsoft spends so much time and money working to completely control windows7 when it is all but finished ”
I have found that, in human affairs, there are some big groups, organizations, companies, etc. that are oriented mostly towards:
(1) Preeminence (to do anything they want).
(2) Control (to achieve and maintain (1) — and because they can’t help themselves).
(3) Respect (to them).
MS has been, since Bill Gates on, mostly about (1) and (2).
Early example and harbinger of things to come: IE imposed as the default browser.
It took a serious court battle to end that:
https://www.britannica.com/technology/Internet-Explorer
https://www.nytimes.com/2000/04/04/opinion/microsoft-s-illegal-monopoly.html
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV -
anonymous
GuestSeptember 25, 2018 at 11:24 am #219586I just checked and the update catalog is now served over HTTPS (wasn’t too long ago that it was still using HTTP). The links to the catalog from the Windows 10 update changelog pages still point to the HTTP site though (it will then redirect to HTTPS, but as I’ve been told, there’s still the opportunity to hijack a connection even if HTTP is used only briefly to redirect to HTTPS).
I never update from Windows Update anymore (I use Windows 10, which should be self-explanatory as to why I don’t use Windows Update). I download my updates from the catalog and install them there. More control, and as a plus I can uninstall them later through the Control Panel. Get off my lawn, Microsoft.
-
b
AskWoody_MVPSeptember 25, 2018 at 11:55 am #219606I never update from Windows Update anymore (I use Windows 10, which should be self-explanatory as to why I don’t use Windows Update). I download my updates from the catalog and install them there. More control, and as a plus I can uninstall them later through the Control Panel. Get off my lawn, Microsoft.
You can uninstall any Windows 10 update through Control Panel:
-
-
anonymous
Guest -
anonymous
GuestSeptember 26, 2018 at 1:21 pm #219848I may be reading into your short comment here, and apologise if that is so.
Reading in previous discussions led me to believe that Windows update transmissions are secured by signatures and verifying hashed checksum values without relying on the additional hurdle of the HTTPS protocol.
If I am repeating a misunderstanding, I offer an apology for that as well.
-
anonymous
Guest
-
-
Michael432
AskWoody_MVPSeptember 26, 2018 at 4:33 pm #219924Just because data is transmitted via port 80, it does not mean the data is not encrypted.
Technically this is true, but very very unlikely. And HTTPS is not hype. It is not perfect but it does make things more secure. And, the flip side is that there is no excuse to still use HTTP when updating the operating system. I suspect the reason is that MS does not care.
Get up to speed on router security at RouterSecurity.org and Defensive Computing at DefensiveComputingChecklist.com
-
-
Michael432
AskWoody_MVPSeptember 26, 2018 at 4:38 pm #219927Using SOAP Secure Message for end-to-end encryption of the payload ensures that things are secure, even over HTTP. That’s what Microsoft is using for data transfers over port 80.
Where did you read this? Verifying it requires packet sniffing the traffic and trying to decrypt the data (if it is encrypted). And, even if they are sending encrypted data over HTTP, the fact remains that there is no reason not to use HTTPS. And, HTTP traffic can be modified in flight, so they need to detect and fix that too, something HTTPS already do.
Get up to speed on router security at RouterSecurity.org and Defensive Computing at DefensiveComputingChecklist.com
-
anonymous
GuestSeptember 27, 2018 at 1:52 pm #220102SOAP Secure Message ensures that data is not tampered with. HTTPS just encrypts the transport, not the payload — and, other than SOAP Secure Message, HTTPS does not protect against man-in-the-middle attacks. And yes, there’s way too much hype about HTTPS and the HTTPS fanboys should do their homework before parroting nonsense.
-
-
anonymous
GuestSeptember 26, 2018 at 5:10 pm #219931imho, so humble I won’t capitalise it, we have more worries about poorly tested and broken updates than intercepted and maliciously changed updates. I think there are years worth of data points to back this conjecture on both sides of the argument.
It may be far easier to discuss how little Microsoft cares about end consumers in the realm of customer service transparency, agility, reliability &c.
Viewing 17 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
How well does your browser block trackers?
by
n0ads
1 minute ago -
You can’t handle me
by
Susan Bradley
2 hours, 14 minutes ago -
Chrome Can Now Change Your Weak Passwords for You
by
Alex5723
12 minutes ago -
Microsoft: Over 394,000 Windows PCs infected by Lumma malware, affects Chrome..
by
Alex5723
7 hours, 35 minutes ago -
Signal vs Microsoft’s Recall ; By Default, Signal Doesn’t Recall
by
Alex5723
7 hours, 47 minutes ago -
Internet Archive : This is where all of The Internet is stored
by
Alex5723
7 hours, 59 minutes ago -
iPhone 7 Plus and the iPhone 8 on Vantage list
by
Alex5723
8 hours, 5 minutes ago -
Lumma malware takedown
by
EyesOnWindows
15 hours, 18 minutes ago -
“kill switches” found in Chinese made power inverters
by
Alex5723
16 hours, 52 minutes ago -
Windows 11 – InControl vs pausing Windows updates
by
Kathy Stevens
16 hours, 46 minutes ago -
Meet Gemini in Chrome
by
Alex5723
20 hours, 52 minutes ago -
DuckDuckGo’s Duck.ai added GPT-4o mini
by
Alex5723
21 hours ago -
Trump signs Take It Down Act
by
Alex5723
1 day, 4 hours ago -
Do you have a maintenance window?
by
Susan Bradley
16 hours, 8 minutes ago -
Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms
by
Nibbled To Death By Ducks
7 hours, 11 minutes ago -
Cox Communications and Charter Communications to merge
by
not so anon
1 day, 8 hours ago -
Help with WD usb driver on Windows 11
by
Tex265
1 day, 13 hours ago -
hibernate activation
by
e_belmont
1 day, 17 hours ago -
Red Hat Enterprise Linux 10 with AI assistant
by
Alex5723
1 day, 21 hours ago -
Windows 11 Insider Preview build 26200.5603 released to DEV
by
joep517
2 days ago -
Windows 11 Insider Preview build 26120.4151 (24H2) released to BETA
by
joep517
2 days ago -
Fixing Windows 24H2 failed KB5058411 install
by
Alex5723
20 hours, 12 minutes ago -
Out of band for Windows 10
by
Susan Bradley
2 days, 4 hours ago -
Giving UniGetUi a test run.
by
RetiredGeek
2 days, 11 hours ago -
Windows 11 Insider Preview Build 26100.4188 (24H2) released to Release Preview
by
joep517
2 days, 19 hours ago -
Microsoft is now putting quantum encryption in Windows builds
by
Alex5723
15 hours, 12 minutes ago -
Auto Time Zone Adjustment
by
wadeer
2 days, 23 hours ago -
To download Win 11 Pro 23H2 ISO.
by
Eddieloh
2 days, 21 hours ago -
Manage your browsing experience with Edge
by
Mary Branscombe
2 hours, 36 minutes ago -
Fewer vulnerabilities, larger updates
by
Susan Bradley
3 minutes ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.