Server 2025

Winsage
July 27, 2025
Microsoft has released dynamic updates for Windows 11, specifically for version 24H2 and Windows Server 2025, while Windows 10 users will not receive new enhancements. These updates improve the Windows Recovery Environment (WinRE) and Setup binaries, ensuring the preservation of Language Pack and Features on Demand content during upgrades. The updates include KB5062839, which enhances Windows setup binaries, and KB5063689, which improves the Windows recovery environment. Both updates will be automatically downloaded and installed via Windows Update, but can also be accessed manually through Microsoft's Update Catalog.
Winsage
July 16, 2025
Microsoft released the KB5062553 update for Windows, which caused boot failures in some Generation 2 Azure Virtual Machines (VMs) with Trusted Launch disabled. In response, Microsoft issued an emergency patch, KB5064489, applicable to Windows 11 and Windows Server 2025, to address these issues. Affected VMs may experience boot failures if Virtualization-Based Security (VBS) is enforced via registry key. Users are advised to check if their VMs are created as “Standard” and if VBS is enabled. The KB5064489 update is not automatically deployed and must be manually downloaded from the Microsoft Update Catalog, with specific installation methods outlined.
Winsage
July 15, 2025
Microsoft released an emergency update to address a bug affecting Azure virtual machines (VMs) that prevented them from launching when the Trusted Launch setting was disabled while Virtualization-Based Security (VBS) was enabled. This issue emerged during the July Patch Tuesday security updates and impacted Windows Server 2025 and Windows 11 24H2, specifically affecting VMs using version 8.0 with VBS provided by the host. The root cause was identified as a secure kernel initialization issue, which has been fixed with the KB5064489 out-of-band update. Administrators are advised to check if their VMs are created as "Standard" and if VBS is enabled. If affected, they should install the out-of-band update instead of the July 8th KB5062553 Patch Tuesday update and consider using the Trusted Launch security feature. Microsoft has also updated Windows Server 2025 VM images to include the latest cumulative update addressing this bug.
Winsage
July 13, 2025
Microsoft has released its monthly security updates for Windows 11 versions 24H2, 23H2, and 22H2, identified as KB5062553 and KB5062552. Dynamic updates have been introduced to improve the Windows Recovery experience and enhance Setup binaries. Key updates include: - KB5062785: Setup Dynamic Update for Windows 11, version 24H2 and Windows Server 2025, enhancing setup binaries. - KB5062683: Setup Dynamic Update for Windows 11, versions 22H2 and 23H2, improving setup binaries. - KB5062688: Safe OS Dynamic Update for Windows 11, version 24H2 and Windows Server 2025, enhancing recovery environment and resolving a USB-C issue on Arm64 systems. - KB5062693: Safe OS Dynamic Update for Windows 11, versions 22H2 and 23H2, improving recovery environment. These updates will be automatically downloaded and installed via Windows Update, or can be accessed manually through the Microsoft Update Catalog.
Winsage
July 10, 2025
Microsoft has acknowledged ongoing issues with Windows Server Update Services (WSUS) that are affecting the synchronization and deployment of updates, leading to significant challenges for businesses. Users have reported synchronization failures and timeout errors, with many expressing frustration over the lack of communication from Microsoft. The affected platforms include various versions of Windows 10 and Windows 11, as well as multiple Windows Server versions. Error logs indicate problems such as "Unable to connect to the remote server." Currently, there is no workaround available, and Microsoft is working on repairs related to a problematic update revision. Reports of the issue have emerged globally, with some users experiencing new errors and an overwhelming number of updates being downloaded.
Winsage
July 10, 2025
A security vulnerability, designated CVE-2025-48818, has been identified in Windows BitLocker encryption, allowing attackers to exploit a time-of-check time-of-use (TOCTOU) race condition to bypass encryption. The vulnerability has a CVSS score of 6.8 and affects multiple versions of Windows, specifically targeting BitLocker Device Encryption. It requires physical access to the target system, has low attack complexity, and does not require user interaction. The affected Windows platforms include Windows 10 (versions 1607, 21H2, 22H2), Windows 11 (versions 22H2, 23H2, 24H2), and Windows Server editions (2016, 2022, 2025). Microsoft has released security updates to address this vulnerability, with key patches for specific Windows versions. System administrators are advised to install these updates and enhance physical security measures to prevent unauthorized access.
Search