Microsoft update

Winsage
March 12, 2026
In March, Microsoft released cumulative security updates for Windows 10 and Windows 11, with support for certain versions continuing until March 2026. The updates include KB5079466 for Windows 11 version 26H1, KB5079473 for versions 24H2 and 25H2, KB5078883 for version 23H2, and KB5078885 for Windows 10 version 22H2. These updates will be distributed via Windows Update, the Microsoft Update Catalog, and WSUS for enterprise environments. This month, Microsoft combined the Servicing Stack Update (SSU) with the Latest Cumulative Update, simplifying the update process. Key enhancements include improvements to Secure Boot, with expanded device target data for new certificates, and security enhancements for Explorer’s search functionality in Windows 11 versions 24H2 and 25H2. A fix for Windows Defender Application Control (WDAC) was also implemented, addressing issues with COM objects under certain policy configurations. The Windows System Image Manager received a new warning dialog for confirming the trustworthiness of catalog files, which is important for enterprise environments. Updates for Windows 10 22H2, despite its end-of-life status, included fixes for secure boot issues and improvements for file version history in the Control Panel. An SSU for Windows 11 (KB5077869) was also released to maintain update stability. Microsoft's updates scheduled for March 2026 will address vulnerabilities in components like the Windows App Installer, SQL Server, and Microsoft Office. The Security Update Guide provides detailed information on specific vulnerabilities and affected components.
Winsage
January 19, 2026
Some users of Windows 11 have experienced a problem where their PCs reboot instead of shutting down after the Patch Tuesday security update KB5073455. This issue primarily affects devices with Secure Launch on Windows 11 version 23H2. Microsoft has confirmed this behavior, which disrupts the usual power-off sequence and can drain battery life for laptops and complicate remote management processes. An out-of-band update, KB5077797, has been released to restore normal shutdown and hibernation functionalities for affected systems. Users can check for this update in Windows Update or download it from the Microsoft Update Catalog. To determine if they are affected, users should look for immediate restarts when selecting Shut Down or Hibernate and check if Secure Launch is enabled in System Information.
Winsage
January 6, 2026
Microsoft has released a support document titled “Release information for AI components” that details the AI components integrated into Windows 11, which can be installed through Windows Update or accessed via the Microsoft Update Catalog. These components are essential for enabling various AI models to operate locally on devices, and installations typically occur automatically on compatible PCs with 40+ TOPs of NPU. The size of Windows 11 Patch Tuesday updates has increased significantly, now ranging from 4-5GB, compared to previous updates that were under 800MB. Users can manage AI components through Settings > System > AI Components, although this page is empty for older PCs. The changelog includes individual components like the Settings Model, Image Search, Semantic Analysis, and Content Extraction, as well as lower-level elements such as Execution Provider. Updates for these AI models occur every few weeks, often without visible changes.
Winsage
December 11, 2025
A vulnerability in the Windows Defender Firewall Service, designated as CVE-2025-62468, was disclosed on December 9, 2025, and has an Important severity rating. It results from an out-of-bounds read condition, allowing an authorized attacker with elevated privileges to access sensitive heap memory without user interaction. The vulnerability has a CVSS v3.1 base score of 4.4, indicating moderate severity, and is characterized by a local attack vector, low attack complexity, high privileges required, and no user interaction needed. Microsoft assessed the likelihood of exploitation as unlikely and has released security updates for affected products, including Windows Server 2025 and various versions of Windows 11. The vulnerability primarily affects organizations with strict access controls and monitoring protocols. Security researchers from Kunlun Lab are credited with responsibly disclosing this vulnerability.
Winsage
December 10, 2025
Microsoft released a significant update addressing 56 security vulnerabilities across its Windows operating systems and supported software. This update includes a patch for a zero-day exploit, CVE-2025-62221, a privilege escalation vulnerability affecting Windows 10 and later versions. Throughout 2025, Microsoft has patched a total of 1,129 vulnerabilities, marking an 11.9% increase from the previous year. Three vulnerabilities were classified as critical: CVE-2025-62554 and CVE-2025-62557 related to Microsoft Office, and CVE-2025-62562 related to Microsoft Outlook. Several non-critical privilege escalation vulnerabilities were identified as likely to be exploited, including CVE-2025-62458, CVE-2025-62470, CVE-2025-62472, CVE-2025-59516, and CVE-2025-59517. Another vulnerability, CVE-2025-64671, was found in the Github Copilot Plugin for Jetbrains, allowing remote code execution. Additionally, CVE-2025-54100 is a remote code execution bug in Windows Powershell affecting Windows Server 2008 and later.
Search