Microsoft to Block Windows 11 and Server 2025 Automated Installation After Critical RCE Vulnerability

Microsoft has unveiled a strategic two-phase initiative aimed at disabling the hands-free deployment feature within Windows Deployment Services (WDS). This decision comes in light of a critical remote code execution (RCE) vulnerability, identified as CVE-2026-0386, which poses significant risks to enterprise environments.

Windows Deployment Services Vulnerability

The vulnerability, published on January 13, 2026, is attributed to improper access control conditions (CWE-284) associated with the Unattend.xml file. This file, essential for automating installation processes, is transmitted over an unauthenticated RPC channel, making it susceptible to interception. An attacker on the same network segment can exploit this flaw to access sensitive configuration files, potentially stealing embedded credentials or injecting malicious code during the OS deployment process.

Security experts have highlighted that a successful exploitation could grant SYSTEM-level privileges, enabling lateral movement within a domain and posing a supply chain risk by compromising OS deployment images in enterprise data centers. Microsoft has assigned a CVSS v3.1 score reflecting high impact across confidentiality, integrity, and availability for this vulnerability, which affects a range of Windows Server versions from 2008 to 2025, including 2016, 2019, 2022, and version 23H2.

Two-Phase Hardening Timeline

To mitigate the risks associated with this vulnerability, Microsoft will implement changes in two distinct phases:

  • Phase 1 — January 13, 2026: The hands-free deployment feature will remain operational but can be explicitly disabled. New Event Log alerts and registry key controls will be introduced, enabling administrators to enforce secure practices by setting AllowHandsFreeFunctionality = 0 under HKLMSYSTEMCurrentControlSetServicesWdsServerProvidersWdsImgSrvUnattend.
  • Phase 2 — April 2026: The hands-free deployment feature will be completely disabled by default. Administrators who have not adjusted any registry configurations between January and April 2026 will find this feature automatically blocked following the April security update.

For those who find it imperative to retain the feature temporarily, it can be re-enabled by setting AllowHandsFreeFunctionality = 1. However, Microsoft cautions that this configuration is not secure and should only be considered a temporary measure.

  • Review all WDS configurations for Unattend.xml usage immediately.
  • Apply the January 13, 2026, or later Windows security update.
  • Set AllowHandsFreeFunctionality = 0 to ensure secure behavior before April 2026.
  • Monitor Event Viewer for alerts regarding insecure access to unattend.xml files.
  • Consider migrating to alternative deployment methods such as Microsoft Intune, Windows Autopilot, or Microsoft Configuration Manager, which are unaffected by this vulnerability.

For comprehensive guidance and registry details, Microsoft’s KB article 5074952 serves as a valuable resource for impacted organizations. Administrators are strongly encouraged to take action before April 2026 to safeguard their deployment processes.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

Winsage
Microsoft to Block Windows 11 and Server 2025 Automated Installation After Critical RCE Vulnerability