Microsoft released emergency out‑of‑band updates on January 17, 2026 — most notably KB5077744 and KB5077797 — to address critical post‑Patch‑Tuesday regressions that left many users unable to sign in to Remote Desktop services or in some cases unable to shut down cleanly. The packages are available through Windows Update for automatic deployment, and Microsoft has also published standalone installers in the Microsoft Update Catalog for administrators or users who need to download and apply the fixes manually.
Windows Update occasionally issues out‑of‑band (OOB) releases when a broad reliability or security regression is discovered after the normal Patch Tuesday cycle. These emergency updates are cumulative and typically include the latest servicing stack update (SSU) combined with the latest cumulative LCU (latest cumulative update) so devices receive both servicing and quality fixes in one package. Microsoft documents this combined SSU+LCU approach and publishes KB articles for each OOB release that describe the scope, affected builds, and known issues. Out‑of‑band updates are inherently reactive: they are designed to restore critical functionality quickly. That speed is a strength when businesses and remote workers are impacted, but it also raises deployment and testing concerns for IT teams responsible for large fleets. The January 17 releases are a clear example — Microsoft acted quickly to remediate serious regressions introduced by January 13 updates, but a handful of other regressions remain under investigation.
The January emergency releases are a textbook case in balancing speed and caution: Microsoft acted quickly to restore critical functionality, but administrators must still exercise discipline when deploying these out‑of‑band packages across production fleets.
Conclusion: The KB5077744 and KB5077797 out‑of‑band updates are available now, through Windows Update and the Microsoft Update Catalog, and should be applied by affected users and administrators after appropriate testing. Administrators should pay particular attention to the combined SSU+LCU packaging, known remaining issues called out by Microsoft and industry reporting, and the recommended deployment best practices (pilot, backup, rollback planning) before mass rollout.
Source: Neowin https://www.neowin.net/news/microso...797-emergency-updates-for-manual-downloading/
Background
Windows Update occasionally issues out‑of‑band (OOB) releases when a broad reliability or security regression is discovered after the normal Patch Tuesday cycle. These emergency updates are cumulative and typically include the latest servicing stack update (SSU) combined with the latest cumulative LCU (latest cumulative update) so devices receive both servicing and quality fixes in one package. Microsoft documents this combined SSU+LCU approach and publishes KB articles for each OOB release that describe the scope, affected builds, and known issues. Out‑of‑band updates are inherently reactive: they are designed to restore critical functionality quickly. That speed is a strength when businesses and remote workers are impacted, but it also raises deployment and testing concerns for IT teams responsible for large fleets. The January 17 releases are a clear example — Microsoft acted quickly to remediate serious regressions introduced by January 13 updates, but a handful of other regressions remain under investigation. What Microsoft released: the KBs and what they fix
KB5077744 — Windows 11 (25H2 / 24H2)
- Applies to: Windows 11 versions 25H2 and 24H2.
- Identified OS builds: 26200.7627 (25H2) and 26100.7627 (24H2).
- Primary fix: restores Remote Desktop credential and sign‑in flows that were failing after the January 13 security update (customers reported immediate authentication failures in Remote Desktop clients and the Windows App).
- Package notes: cumulative LCU plus a servicing stack update (SSU KB5071142) and updates to certain AI components used on Copilot‑enabled devices.
- Availability: automatic via Windows Update and as a standalone download through Microsoft Update Catalog for manual deployment.
KB5077797 — Windows 11 (23H2)
- Applies to: Windows 11 version 23H2.
- Identified OS build: 22631.6494.
- Primary fixes: resolves the Remote Desktop sign‑in failures observed after January 13, and fixes a separate regression where some devices with Secure Launch enabled would restart instead of shutting down or entering hibernation.
- Package notes: combined SSU (KB5071963) and LCU; Microsoft reports no known issues at the time of publication for this KB.
- Availability: automatic via Windows Update and as a manual download from the Microsoft Update Catalog.
Windows 10 and other platform coverage
Microsoft published out‑of‑band updates for a range of platforms alongside the Windows 11 fixes. For Windows 10 and extended servicing channels there are corresponding OOB packages (for example, KB5077796 and others) that also address Remote Desktop authentication failures introduced by the January updates. Administrators should consult the relevant Microsoft KB page for their specific platform/version to confirm the correct package.Why these fixes mattered: impact and scope
The post‑Patch‑Tuesday regressions struck at core remote access and power management behaviors:- Remote Desktop credential prompt failures were widespread enough to affect cloud PC, Azure Virtual Desktop, and Windows App RDP use. The authentication flow was terminating early on the client side, blocking session creation and leaving users unable to connect to managed remote desktops. This created a high‑priority availability problem for remote work.
- Some devices with Secure Launch enabled — a security feature used on certain enterprise hardware — were experiencing restarts when issuing a shutdown or hibernate. That behavior directly affects shutdown automation, imaging scripts, and power control in managed data centers and branch offices. KB5077797 explicitly lists this regression and its fix.
How Microsoft made the fixes available
Microsoft’s OOB KB pages make two deployment paths clear:- Automatic rollout via Windows Update and Windows Update for Business/WSUS, where devices will receive the update through normal channels based on rollout policies.
- Manual download from the Microsoft Update Catalog for direct deployment, offline installation, or pushing via systems management tools.
Manual download and installation: practical steps
For administrators and power users who prefer manual control or need to apply the fix immediately to affected machines, the Microsoft Update Catalog provides standalone packages (.msu or .cab). The following is an actionable, verified procedure based on Microsoft documentation and Microsoft Learn guidance.- Search the Microsoft Update Catalog
- Open the Microsoft Update Catalog in a web browser and search for the KB number (for example, KB5077744 or KB5077797). Select the row that matches your OS architecture (x64, ARM64).
- Download the package
- Use the Catalog’s Download button and save the .msu or .cab files to a local folder on the target machine or your management server. Modern browsers are supported; Internet Explorer/ActiveX is no longer required.
- Install using WUSA (for .msu)
- Double‑click the .msu file to start the Windows Update Standalone Installer (WUSA), or run it from an elevated Command Prompt:
- wusa C:\path\to\Windows10.0‑KB5077744‑x64.msu /quiet /norestart
- Use the /quiet switch for unattended installs; use /norestart to delay automatic reboot. Microsoft’s WUSA documentation explains these switches and their behavior.
- Install using DISM (for .cab or image servicing)
- For CAB files or offline images use DISM:
- start /wait DISM.exe /Online /Add‑Package /PackagePath:C:\path\Windows11.0‑KB5077744.cab /Quiet /NoRestart
- DISM is also the supported tool for servicing offline WIM images and is documented for handling checkpoint cumulative updates.
- Verify installation and reboot
- After installation, check the OS build and installed packages (Settings → Windows Update → Update history or use DISM /online /get‑packages) and then reboot if required. Reboots may be necessary to complete SSU and LCU updates.
- Microsoft’s KB articles explicitly warn that combined SSU+LCU packages cannot be uninstalled using wusa.exe /uninstall because the SSU cannot be removed once applied. If rollback is required, administrators must follow DISM remove package procedures and have a tested recovery plan.
- When multiple checkpoint cumulative updates are required, WUSA and DISM support installing the necessary sequence when the files are placed in the same folder; Microsoft documents the correct ordering behavior for checkpoint cumulative installs.
Recommendations for administrators and power users
- If your environment is affected: prioritize patching. If you see RDP authentication failures or unexpected restart-on-shutdown behavior, apply the appropriate OOB package immediately. Manual install from the Update Catalog is acceptable for urgent remediation. Test the package on a small pilot group before broad deployment.
- If you are not affected: consider a measured approach. Monitor Windows Update deployment and the Windows release health dashboard; avoid rushing updates into production without testing if no symptoms are present.
- Enterprise fleets: prefer Known Issue Rollback (KIR) where Microsoft provides the rollback artifact, or use Group Policy to deploy KIR when applicable. KIR is a more surgical mitigation for managed fleets than uninstalling cumulative updates.
- Back up before mass deployment: because SSUs are non‑removable via wusa and because OOB packages are cumulative, ensure you have system state/backups and tested rollback procedures for critical servers.
- Check dependent components: for environments using Azure Virtual Desktop, Cloud PCs, or third‑party RDP clients, validate connectivity post‑patch and confirm no other app‑level side effects (Outlook, Teams, browser integrations) have been introduced. Industry reporting indicates some app interactions remain under review.
Critical analysis: strengths and risks
Strengths — Microsoft’s response and communication
- Rapid remediation: Microsoft identified a major regression (Remote Desktop authentication failures) and issued OOB cumulative updates within days of Patch Tuesday. Quick OOB releases reduce downtime for businesses reliant on remote work. This responsiveness is a clear operational strength for Microsoft’s servicing model.
- Clear KB documentation: the KB articles list affected versions, OS builds, the user‑visible symptom, the fix, and known issues, allowing admins to match package to platform. The inclusion of SSU details and explicit install/uninstall guidance helps reduce accidental missteps during manual deployment.
- Catalog availability: publishing manual installers in the Microsoft Update Catalog gives IT full control when automatic updates are delayed by policy, network constraints, or urgent remediation needs.
Risks and outstanding concerns
- Regression risk from emergency patches: OOB fixes are designed to be fast, not deeply experimental, yet every update changes system components. There are documented cases of residual regressions (black screen delays, desktop background resets, and an Outlook POP client freeze) reported by community outlets and users, which Microsoft has acknowledged in part and continues to investigate. That creates deployment risk for organizations lacking robust test windows. These remaining issues are under active investigation and may not yet be fully validated across all hardware/driver combinations.
- Uninstall complexity: combined SSU+LCU packaging means administrators cannot trivially undo an OOB installation with wusa.exe /uninstall. Removing the LCU requires DISM remove operations and dependency checks; in production environments, this adds operational overhead and risk if a rollback becomes necessary. Microsoft explicitly calls this out in the KBs.
- Incomplete public telemetry details: reporting and KB text indicate the issue affected “many” enterprise users, and third‑party outlets reference broad impact, but Microsoft does not publish raw telemetry or exact counts of affected devices. Claims about the scale of the outage should therefore be treated cautiously until Microsoft releases more detailed telemetry numbers. This is an example of where independent verification from large IT customers or Microsoft’s telemetry release would be necessary to quantify the outage precisely. This specific telemetry is not publicly available at the time of writing.
- Intersections with Copilot/AI components: KB5077744 updates several AI components used on Copilot+ devices. While Microsoft lists component versions, it does not imply these components affect every machine; they install only where applicable. Administrators in mixed fleets should be mindful of which devices receive those AI packages.
Frequently encountered questions (quick answers)
- Will my PC get the update automatically?
Yes — Windows Update will deliver the OOB package according to Microsoft’s rollout and your update policy; for immediate control, download the package from Microsoft Update Catalog. - Can I uninstall the update if it causes trouble?
Not via wusa.exe /uninstall if the combined SSU+LCU package is installed. Removing the LCU requires DISM and careful package‑dependency management. Back up and test before wide rollouts. - Are servers affected?
Microsoft released corresponding fixes for server SKUs as well (for example, Server 2025 and Server 2022 packages to address Remote Desktop issues). Check the Microsoft KBs for server‑specific packages. - Is this a security vulnerability exploit?
The published KBs describe regressions introduced by the January security update that impaired functionality — Microsoft’s language indicates these were not compromises or active exploitations, but reliability regressions that needed fixing.
Final assessment and practical takeaways
Microsoft’s January 17 emergency updates — including KB5077744 and KB5077797 — demonstrate an effective rapid‑response cycle: a high‑impact regression was identified, investigated, and patched within days. For organizations and individual users struggling with Remote Desktop authentication or Secure Launch shutdown regressions, the OOB packages and Microsoft Update Catalog downloads provide immediate remediation options. At the same time, these emergency fixes underline two continuing realities of modern OS servicing:- Rapid updates are essential but can introduce secondary regressions; thorough testing in a staged rollout remains the most reliable mitigation for enterprise risk.
- SSU+LCU combined packages simplify future servicing but complicate rollback paths — admins must prepare recovery plans and rely on Known Issue Rollback artifacts when available.
The January emergency releases are a textbook case in balancing speed and caution: Microsoft acted quickly to restore critical functionality, but administrators must still exercise discipline when deploying these out‑of‑band packages across production fleets.
Conclusion: The KB5077744 and KB5077797 out‑of‑band updates are available now, through Windows Update and the Microsoft Update Catalog, and should be applied by affected users and administrators after appropriate testing. Administrators should pay particular attention to the combined SSU+LCU packaging, known remaining issues called out by Microsoft and industry reporting, and the recommended deployment best practices (pilot, backup, rollback planning) before mass rollout.
Source: Neowin https://www.neowin.net/news/microso...797-emergency-updates-for-manual-downloading/

