update catalog

Winsage
January 19, 2026
Some users of Windows 11 have experienced a problem where their PCs reboot instead of shutting down after the Patch Tuesday security update KB5073455. This issue primarily affects devices with Secure Launch on Windows 11 version 23H2. Microsoft has confirmed this behavior, which disrupts the usual power-off sequence and can drain battery life for laptops and complicate remote management processes. An out-of-band update, KB5077797, has been released to restore normal shutdown and hibernation functionalities for affected systems. Users can check for this update in Windows Update or download it from the Microsoft Update Catalog. To determine if they are affected, users should look for immediate restarts when selecting Shut Down or Hibernate and check if Secure Launch is enabled in System Information.
Winsage
January 6, 2026
Microsoft has released a support document titled “Release information for AI components” that details the AI components integrated into Windows 11, which can be installed through Windows Update or accessed via the Microsoft Update Catalog. These components are essential for enabling various AI models to operate locally on devices, and installations typically occur automatically on compatible PCs with 40+ TOPs of NPU. The size of Windows 11 Patch Tuesday updates has increased significantly, now ranging from 4-5GB, compared to previous updates that were under 800MB. Users can manage AI components through Settings > System > AI Components, although this page is empty for older PCs. The changelog includes individual components like the Settings Model, Image Search, Semantic Analysis, and Content Extraction, as well as lower-level elements such as Execution Provider. Updates for these AI models occur every few weeks, often without visible changes.
Winsage
December 21, 2025
Microsoft has released emergency updates to address malfunctions with Windows Message Queuing (MSMQ) that occurred after the December security updates. The issues affect several versions of Microsoft Windows, including Windows 10 and various editions of Windows Server up to Server 2019, posing a risk of application outages for users relying on MSMQ. The problem arose from changes to the MSMQ security model, which modified NTFS access rights to the C:WindowsSystem32MSMQstorage folder, stripping applications or services without administrative rights of necessary write permissions. The updates are identified by knowledgebase numbers: KB5074976 for Windows 10, KB5074975 for Windows Server 2019, and KB5074974 for Windows Server 2016, raising Windows 10 build numbers to 19044.6693 and 19045.6693. Initially, these updates were not available through the standard Windows update function and could only be accessed via the Windows update catalog. Microsoft has expanded the list of affected systems to include earlier versions of Windows 10 (21H2, 1809, and 1607) and Windows Server 2012 R2 and 2012. Users of these systems should verify the application of December updates and manually install the emergency updates if necessary.
Winsage
December 19, 2025
Microsoft released an out-of-band update (KB5074976) on December 19 to address Message Queuing (MSMQ) errors caused by December 2025 security updates. These updates have led to operational disruptions in business applications and IIS websites, particularly on systems running Windows 10 22H2, Windows Server 2019, and Windows Server 2016, which received updates KB5071546, KB5071544, and KB5071543. Users reported issues such as inactive MSMQ queues, IIS sites generating "insufficient resources" error messages, and applications unable to write messages to queues. The problems stem from modifications in the MSMQ security model, which altered permissions for the system folder C:WindowsSystem32msmqstorage, requiring MSMQ users to have write access typically reserved for administrators. Systems with full administrative rights do not experience these issues. Microsoft is investigating the matter but has not provided a timeline for a resolution.
Winsage
December 11, 2025
A vulnerability in the Windows Defender Firewall Service, designated as CVE-2025-62468, was disclosed on December 9, 2025, and has an Important severity rating. It results from an out-of-bounds read condition, allowing an authorized attacker with elevated privileges to access sensitive heap memory without user interaction. The vulnerability has a CVSS v3.1 base score of 4.4, indicating moderate severity, and is characterized by a local attack vector, low attack complexity, high privileges required, and no user interaction needed. Microsoft assessed the likelihood of exploitation as unlikely and has released security updates for affected products, including Windows Server 2025 and various versions of Windows 11. The vulnerability primarily affects organizations with strict access controls and monitoring protocols. Security researchers from Kunlun Lab are credited with responsibly disclosing this vulnerability.
Winsage
November 18, 2025
Jack Bicer, the director of vulnerability research at Action1, advises IT leaders to ensure the latest servicing stack update (SSU) is installed before reapplying a patch after Microsoft’s patch release on November 17. He recommends troubleshooting steps for system file corruption, including: 1. Temporarily disabling non-Microsoft services and startup applications through a Clean Boot. 2. Manually installing the update by downloading the .msu package for KB5068781 from the Microsoft Update Catalog and using the command wusa.exe .msu /quiet /norestart. 3. Verifying the build number with the winver command, targeting build numbers 19045.6575 (22H2) or 19044.6575 (21H2).
Search