Windows security updates

Winsage
April 27, 2025
Microsoft's recent security update for Windows has raised concerns among users due to the introduction of a new vulnerability. The update, intended to address the CVE-2025-21204 vulnerability, inadvertently created a folder named inetpub, which Microsoft claims is essential for user protection. Security researcher Kevin Beaumont has warned that this update has introduced a denial of service vulnerability that allows non-admin users to halt future Windows security updates. Microsoft has classified the issue as moderate in severity and suggested that deleting the inetpub symlink and retrying the update may resolve the problem. The report has been forwarded to the Windows security team for potential further action.
Winsage
April 24, 2025
Microsoft has resolved a known issue causing 0x80070643 installation failure errors during the deployment of the April 2025 Windows Recovery Environment (WinRE) updates. This issue affected the KB5057588 update for Windows Server 2022 and the KB5057589 update for Windows 10, versions 22H2 and 21H2. The error message was misleading, as it did not reflect the actual status of the update or the device's performance. The error typically occurred when a device attempted to install the WinRE update while another update was pending a reboot. Microsoft confirmed that users will no longer see the incorrect error message after installing the affected updates. Additionally, in August of the previous year, Microsoft retired the January 2024 Windows security updates that also triggered 0x80070643 errors during WinRE updates. During that time, fraudulent IT support websites promoted malicious PowerShell "fixes" for these errors, leading to malware infections among users.
Winsage
April 15, 2025
Microsoft has acknowledged that some users may experience installation failures with error code 0x80070643 when deploying the April 2025 Windows Recovery Environment (WinRE) updates, specifically affecting the KB5057589 update for Windows 10 versions 22H2 and 21H2, and the KB5057588 update for Windows Server 2022. The company stated that this error is misleading and does not affect device functionality, as the WinRE update is typically applied successfully after a device restart. Users may see a failure indication in Windows Update, but this will be resolved after the next daily scan and restart. Microsoft is working on a resolution for this issue, which follows a similar situation from August 2024. Additionally, fraudulent IT support websites have been identified promoting malicious PowerShell "fixes" for these errors.
Winsage
April 9, 2025
Microsoft resolved an authentication issue related to Credential Guard on systems using the Kerberos PKINIT pre-authentication protocol, affecting Windows 11, version 24H2, and Windows Server 2025. The problem involved improper password rotation when using the Identity Update Manager certificate, leading to user authentication issues primarily in enterprise environments. Devices failed to change passwords every 30 days, causing them to be perceived as stale, disabled, or deleted. The resolution was provided in April 2025 through Windows security updates, and Machine Accounts in Credential Guard were temporarily disabled. Microsoft advised users to install the latest updates for improvements and fixes. This is not the first authentication issue Microsoft has addressed; previous challenges occurred in November 2022 and November 2021, involving Kerberos sign-in failures and delegation scenarios.
Winsage
March 20, 2025
Microsoft has released Windows 11 Build 27818 for users in the Canary Channel, enhancing File Explorer's performance for extracting zip files. The update includes general improvements and fixes, such as displaying additional details about Pluton TPM chips in the Windows Security app. The suggested actions feature for copying phone numbers or future dates is being deprecated. A critical fix addresses a d3d9.dll crash affecting application launches. Other improvements include enhanced performance for unzipping files, fixes for File Explorer Home loading issues, taskbar app window preview corrections, resolution of a ctmon.exe crash impacting typing, fixes for Settings launch errors, graphics performance improvements, resolution of Visual Studio Code installation issues with Admin Protection, and fixes for Remote Desktop freezing issues. Additionally, a fix addresses application opening failures related to a virtual machine component error.
Winsage
March 12, 2025
ESET has identified a zero-day vulnerability in the Windows Win32 Kernel Subsystem, designated as CVE-2025-24983, which has been exploited since March 2023. This vulnerability, stemming from a use-after-free weakness, allows low-privileged attackers to escalate access to SYSTEM privileges without user interaction. It primarily affects older Windows versions, including Windows Server 2012 R2 and Windows 8.1, but also poses risks to newer versions like Windows Server 2016 and Windows 10 (build 1809 and earlier). The exploit was first seen in the wild in March 2023, targeting systems compromised by the PipeMagic malware. Microsoft has addressed this vulnerability in the recent Patch Tuesday updates. Additionally, five other zero-day vulnerabilities were also patched, and CISA has mandated that Federal Civilian Executive Branch agencies secure their systems by April 1st.
Winsage
February 27, 2025
Microsoft has resolved a drag-and-drop functionality issue for emails and calendar items in classic Outlook that arose after the installation of the KB5050094 January 2025 preview cumulative update and the KB5051987 February 2025 security update on Windows 11 version 24H2 systems. The recently released KB5052093 preview cumulative update effectively addresses this issue. A temporary workaround for affected users is to disable the "Optimize for compatibility" setting in Outlook by selecting "Optimize for best appearance" under the General tab in Options. Microsoft has also addressed other Outlook-related issues and plans to enforce the installation of the new Outlook email client on Windows 10 devices starting with the February 2025 Windows security updates.
Winsage
February 9, 2025
Users of Windows 11 24H2 who installed the OS via USB drives may face issues receiving security updates due to flawed installation packages from Microsoft based on updates released in October and November 2024. Microsoft acknowledged that devices installed with these packages might not accept further security updates. This problem does not affect users who installed Windows 11 24H2 through the Windows Update feature. Microsoft first recognized the issue on December 24, 2024, and it has since been marked as 'resolved.' Affected users are advised to reinstall Windows 11 24H2 using the December 2024 version or later, while backing up their files beforehand.
Winsage
February 7, 2025
Microsoft has identified an issue affecting certain users of Windows 11, version 24H2, who cannot receive security updates when installed via CDs or USB flash drives with cumulative updates from October or November 2024. This issue specifically affects installations made between October 8 and November 12, 2024. Users receiving updates through Windows Update or using installation media with updates from December 2024 or later are not impacted. Microsoft advises affected users to reinstall Windows 11, version 24H2, using media with security updates from December 2024 or later. Additionally, the January 2025 optional updates will address another issue preventing non-admin users from modifying their time zone settings, with a temporary solution available through the Windows Control Panel until the fix is fully deployed.
Search