Microsoft quietly published two targeted Dynamic Update packages for Windows 11, version 24H2 (and Windows Server 2025) — KB5065378 (a Setup Dynamic Update) and KB5064097 (a Safe OS / WinRE Dynamic Update) — on August 29, 2025, delivering refreshed setup binaries and a new Windows Recovery Environment (WinRE) image to address installation and recovery reliability during feature updates and image deployments. (support.microsoft.com) (support.microsoft.com) (neowin.net)
Dynamic Updates are a class of servicing packages Windows Setup fetches during in-place upgrades or when installing from media; they let Microsoft refresh the small set of setup and recovery binaries used during installation without rebuilding ISOs or WIMs. That means an offline image created weeks or months earlier can still benefit from fixes published after the ISO was built — a crucial capability for IT teams that maintain image repositories. (learn.microsoft.com)
WinRE (the Windows Recovery Environment, sometimes called “Safe OS”) and Setup binaries are small but mission-critical: they run before the full operating system boots and are used by Reset, Automatic Repair, cloud reinstall, and installation flows. Problems in these components manifest as failed upgrades, broken recovery, or devices stuck in partial upgrade states. The two KBs address exactly that narrow, high-impact surface. (support.microsoft.com)
Community and field reports have repeatedly shown that when recovery or setup components are out of sync with cumulative updates, upgrade failures and recovery regressions spike. For administrators who maintain frozen images or rely on media-based deployment, refreshing Setup and WinRE with the latest DU packages is a low-friction mitigation step. (windowsforum.com, learn.microsoft.com)
Put plainly: while these Dynamic Updates harden setup and recovery, they do not eliminate the broader requirement to update firmware and Secure Boot trust elements before the 2026 certificate expirations. Administrators should coordinate with OEMs and validate firmware update availability before large-scale media refreshes. (techcommunity.microsoft.com)
However, these packages are one piece of a broader operational mosaic. Secure Boot certificate renewal, firmware updates, and reliable WSUS/CM delivery remain essential prerequisites to a smooth rollout. Organizations that skip firmware coordination or presume a DU will solve all upgrade headaches risk encountering edge-case failures. Test, verify, and deploy incrementally — and treat these Dynamic Updates as essential preventive maintenance for setup and recovery rather than a cure-all. (support.microsoft.com, bleepingcomputer.com)
Community and forum reporting mirrored the official guidance and reinforced the operational advice above; the Windows admin community has already started circulating pilot guidance and scripts to help teams automate media refreshes. (neowin.net)
These two KBs are small, backstage updates that deserve a place in any responsible imaging and deployment plan for Windows 11 24H2 and Windows Server 2025 — apply them carefully, verify WinRE and Setup behavior, and make firmware/certificate readiness part of the rollout timeline.
Source: Neowin Microsoft released Windows 11 KB5065378, KB5064097 Setup and Recovery updates
Background / Overview
Dynamic Updates are a class of servicing packages Windows Setup fetches during in-place upgrades or when installing from media; they let Microsoft refresh the small set of setup and recovery binaries used during installation without rebuilding ISOs or WIMs. That means an offline image created weeks or months earlier can still benefit from fixes published after the ISO was built — a crucial capability for IT teams that maintain image repositories. (learn.microsoft.com)WinRE (the Windows Recovery Environment, sometimes called “Safe OS”) and Setup binaries are small but mission-critical: they run before the full operating system boots and are used by Reset, Automatic Repair, cloud reinstall, and installation flows. Problems in these components manifest as failed upgrades, broken recovery, or devices stuck in partial upgrade states. The two KBs address exactly that narrow, high-impact surface. (support.microsoft.com)
What Microsoft shipped: quick summary
- KB5065378 — Setup Dynamic Update for Windows 11, version 24H2 and Windows Server 2025. Refreshes Setup.exe and the files Setup consumes during feature updates; intended for image hardening and smoother in-place upgrades. This package is not distributed via the consumer Windows Update channel and must be retrieved from the Microsoft Update Catalog or synchronized through WSUS. (support.microsoft.com)
- KB5064097 — Safe OS (WinRE) Dynamic Update for Windows 11, version 24H2 and Windows Server 2025. Installs a refreshed WinRE image (expected WinRE build 10.0.26100.5059) and updates Safe‑OS binaries and drivers used during recovery and setup operations. Microsoft lists this one as available via Windows Update and the Update Catalog. (support.microsoft.com)
KB5065378 (Setup Dynamic Update): what’s inside and why it matters
What the KB says
KB5065378 “makes improvements to Windows setup binaries or any files that setup uses for feature updates.” The KB lists dozens of Setup-related files — Appraiser.dll, SetupPlatform binaries, MediaSetup resources, and associated UI and platform helpers — many carrying August 12, 2025 file dates, indicating alignment with the August servicing cadence. The update replaces the prior Setup Dynamic Update for 24H2 and must be pulled from the Microsoft Update Catalog or synced via WSUS. (support.microsoft.com)Why a Setup DU matters in practice
Setup uses a focused set of binaries during a feature upgrade. If any of those are mismatched with recently shipped cumulative updates or drivers, the installation can fail early, leaving the device partially upgraded or non-functional. A Setup Dynamic Update reduces those mismatches by refreshing the exact files Setup uses — a lower-risk, surgical fix compared with rebuilding whole images. Learn.Microsoft explains the role of Dynamic Updates in ensuring media and in-place upgrades remain resilient. (learn.microsoft.com, support.microsoft.com)Distribution and operational notes
- Not available directly through consumer Windows Update; obtain from the Microsoft Update Catalog or WSUS catalog sync. (support.microsoft.com)
- No prerequisites and no restart required when the update is applied to an image. (support.microsoft.com)
- The KB explicitly flags Windows Secure Boot certificate expiration as an operational concern (see the next section on certificate timelines). (support.microsoft.com)
KB5064097 (Safe OS Dynamic Update / WinRE): the recovery refresh
What the KB says
KB5064097 refreshes the Windows Recovery Environment (WinRE) and Safe‑OS components used across reset, cloud-installs, and setup-time recovery. After the update, Microsoft expects WinRE to report version 10.0.26100.5059. This update is available via Windows Update, the Update Catalog, and WSUS (when synchronized) and replaces an earlier Safe OS DU (KB5063689). (support.microsoft.com)Practical impact
A modern, patched WinRE reduces the chance that Reset or cloud reinstall flows will fail when the full OS is compromised. It also improves compatibility with newer drivers and firmware during pre‑boot operations (for example, TPM and BitLocker interactions). Because the recovery image runs outside the main OS, patching WinRE independently is an effective way to close pre‑boot gaps without altering running images. (support.microsoft.com)Verification and tools
Microsoft provides verification guidance, including a sample PowerShell script “GetWinReVersion.ps1” and DISM-based methods to mount winre.wim and inspect file versions. Administrators should confirm the WinRE version after applying the update; the KB shows the script and DISM commands. (support.microsoft.com, learn.microsoft.com)Why Microsoft pushed these now: August 2025 servicing context
August 2025’s servicing cycle produced a cluster of high-visibility issues that increased the operational risk for imaging and update pipelines — notably WSUS delivery failures and installation errors (for example, error 0x80240069 when KB5063878 failed to install via WSUS). Microsoft issued fixes, Known Issue Rollbacks (KIR), and targeted servicing measures in response. Dynamic Updates like KB5065378 and KB5064097 are the precise mechanism for hardening images and recovery flows against that class of setup-time regressions. (bleepingcomputer.com, support.microsoft.com)Community and field reports have repeatedly shown that when recovery or setup components are out of sync with cumulative updates, upgrade failures and recovery regressions spike. For administrators who maintain frozen images or rely on media-based deployment, refreshing Setup and WinRE with the latest DU packages is a low-friction mitigation step. (windowsforum.com, learn.microsoft.com)
Security note: Secure Boot certificates and long-term readiness
KB5065378’s release notes explicitly call attention to Secure Boot certificate expirations starting in June 2026 — an ecosystem-level change that can disrupt pre‑boot security and updateability if devices are not prepared. Microsoft has published guidance and a rollout plan for replacing the expiring 2011-era CAs with 2023-era certificates; IT teams should factor firmware updates and certificate readiness into their rollout plans. This is a cross-cutting operational dependency because WinRE and Setup interact with Secure Boot and TPM during pre-boot workflows. (support.microsoft.com)Put plainly: while these Dynamic Updates harden setup and recovery, they do not eliminate the broader requirement to update firmware and Secure Boot trust elements before the 2026 certificate expirations. Administrators should coordinate with OEMs and validate firmware update availability before large-scale media refreshes. (techcommunity.microsoft.com)
Deployment and verification: a practical checklist for admins
Below is a concise, actionable checklist that consolidates official guidance and operational best practices.- Download and catalog the packages
- KB5065378 (Setup DU) — download the CAB/MSU from Microsoft Update Catalog (or let WSUS sync it). (support.microsoft.com)
- KB5064097 (Safe OS DU) — available via Windows Update and the Update Catalog; confirm whether automatic delivery is acceptable for your fleet. (support.microsoft.com)
- Prepare a test image
- Make a copy of your source media or WIM.
- Use the Microsoft-provided PowerShell media-refresh script or DISM/Add-WindowsPackage sequence to inject the Setup DU and the Safe OS DU into the install.wim and WinRE (winre.wim). The Microsoft Learn article includes fully worked scripts and the recommended sequence (SSU/LCU last, language/FOD ordering). (learn.microsoft.com)
- Verify WinRE and Setup versions
- Run reagentc /info to find WinRE location.
- Mount winre.wim and inspect file versions with DISM or with the provided GetWinReVersion.ps1; confirm WinRE reports 10.0.26100.5059 after KB5064097. (support.microsoft.com, learn.microsoft.com)
- Pilot and expand
- Pilot on a representative cross-section of hardware (OEM workstation models, Copilot+ systems, and any machines with vendor recovery tools).
- Test Reset this PC, cloud reinstall, and an in-place upgrade using the refreshed media.
- Monitor event logs for WinREAgent and Setup errors during flows. (learn.microsoft.com)
- Coordinate firmware and Secure Boot
- Check OEM firmware levels and whether Secure Boot certificate updates are provided; schedule firmware rollouts if needed. The Secure Boot CA refresh is an independent item that can obstruct imaging if ignored. (techcommunity.microsoft.com)
- Rollout guidance
- For organizations using WSUS/Configuration Manager: ensure the Update Catalog entries synchronization is successful and that the packages are approved to the appropriate rings. For air‑gapped media, inject the DU packages into images prior to deployment. (support.microsoft.com, learn.microsoft.com)
Command snippets (operationally useful)
- Check WinRE status:
- reagentc /info
- Mount WinRE and inspect a key binary (example):
- dism /mount-image /ImageFile:"C:\Windows\System32\Recovery\Winre.wim" /Index:1 /MountDir:C:\mnt
- Get-Item C:\mnt\Windows\System32\winpeshl.exe | Select-Object -ExpandProperty VersionInfo
- dism /unmount-image /MountDir:C:\mnt /Discard
- Use the Microsoft-provided GetWinReVersion.ps1 (shown in the KB) to automate version verification. (support.microsoft.com, learn.microsoft.com)
Strengths of these releases
- Surgical scope. Both KBs target a narrow but critical area — setup and pre-boot recovery — which means a high operational benefit relative to their footprint. This reduces the blast radius compared to broad cumulative updates. (support.microsoft.com)
- Image-first design. The Setup DU is expressly designed to be injected into offline media and WIMs, making these updates effective for organizations that rely on frozen media or air-gapped deployment processes. The Microsoft Learn guidance provides robust scripts to automate this. (learn.microsoft.com)
- Direct remediation for recent servicing problems. These updates are a logical and low-risk response to the August servicing frictions — they help prevent setup-time failures caused by file-version mismatches without forcing a wholesale reimage. (bleepingcomputer.com, learn.microsoft.com)
Risks and limitations (what to watch out for)
- Not a silver bullet. Dynamic Updates reduce certain classes of setup and recovery failures but do not guarantee every upgrade or recovery scenario will succeed. Complex driver or firmware mismatches, failing storage hardware, or corrupted user data remain separate failure modes. Administrators should still pilot thoroughly. (learn.microsoft.com)
- Delivery differences between the two KBs. KB5065378 is catalog/WSUS-only by design; if you expect consumer-style automatic deployment you will be surprised. KB5064097, by contrast, may arrive automatically on endpoints. Understand each channel before assuming uniform delivery. (support.microsoft.com)
- Removal and rollback constraints. At least one DU (KB5064097) is documented as not removable once applied to a Windows image. That makes validation before image circulation essential. (support.microsoft.com)
- Secure Boot certificate timing. The Secure Boot CA refresh is a separate but related operational dependency. If firmware and certificate updates aren’t coordinated, imaging or pre-boot operations could face trust issues as certificates expire in 2026. This risk is outside the scope of the DU itself but materially affects recovery and boot flows. (support.microsoft.com, techcommunity.microsoft.com)
- WSUS and delivery fragility. Recent WSUS delivery problems (the 0x80240069 scenario) show enterprise update channels can be brittle; verify WSUS synchronization and test Known Issue Rollback artifacts if you rely on on-prem update distribution. (bleepingcomputer.com)
Quick rollout checklist (at-a-glance)
- Download KB5065378 and KB5064097 from the Update Catalog or verify WSUS sync. (support.microsoft.com)
- Inject into a copied install.wim and winre.wim following Microsoft’s media-refresh script sequence. (learn.microsoft.com)
- Validate WinRE version (10.0.26100.5059) and test Reset/Cloud Reinstall flows on pilot devices. (support.microsoft.com)
- Confirm firmware and Secure Boot certificate readiness with OEM partners. (techcommunity.microsoft.com)
- Expand rollout incrementally; monitor event logs and Windows Release Health dashboard. (support.microsoft.com)
Final assessment
KB5065378 and KB5064097 are targeted, pragmatic updates that address exactly the fragile pieces of the Windows servicing pipeline that break imaging and recovery workflows. Applied correctly, they lower upgrade risk for media-based and in-place feature updates without forcing disruptive reimage cycles. That makes them high-value, low-friction fixes for imaging teams and admins who maintain offline media or large fleets. (support.microsoft.com)However, these packages are one piece of a broader operational mosaic. Secure Boot certificate renewal, firmware updates, and reliable WSUS/CM delivery remain essential prerequisites to a smooth rollout. Organizations that skip firmware coordination or presume a DU will solve all upgrade headaches risk encountering edge-case failures. Test, verify, and deploy incrementally — and treat these Dynamic Updates as essential preventive maintenance for setup and recovery rather than a cure-all. (support.microsoft.com, bleepingcomputer.com)
Community and forum reporting mirrored the official guidance and reinforced the operational advice above; the Windows admin community has already started circulating pilot guidance and scripts to help teams automate media refreshes. (neowin.net)
These two KBs are small, backstage updates that deserve a place in any responsible imaging and deployment plan for Windows 11 24H2 and Windows Server 2025 — apply them carefully, verify WinRE and Setup behavior, and make firmware/certificate readiness part of the rollout timeline.
Source: Neowin Microsoft released Windows 11 KB5065378, KB5064097 Setup and Recovery updates