• Thread Author
A wide-ranging October 2025 cumulative update for Windows 11 (KB5066835), and at least one related preview package, has broken many local IIS-hosted sites and developer workflows — causing ERR_CONNECTION_RESET, ERR_HTTP2_PROTOCOL_ERROR and outright failure of localhost-based services for developers, sysadmins and some commercial applications; practical workarounds are available, but each carries trade-offs that teams must weigh carefully.

Blue-toned computer setup showing ERR_CONNECTION_RESET, a Defender Security Update popup, and a registry editor display.Background​

Microsoft’s October 2025 cumulative update (KB5066835) landed in the normal patch cadence but quickly attracted reports that local web services hosted with IIS and IIS Express stopped responding on loopback addresses. Multiple community threads and Microsoft’s own support channels show the problem affects Windows 11 24H2 and 25H2 builds and often reproduces as HTTP/2 negotiation failures or connection resets when accessing http://localhost or https://localhost.
The issue surfaced in developer workflows (Visual Studio + IIS Express), in test environments, and in productionized desktop-server applications that rely on local IIS for management or inter-process communication. At least one major vendor — Autodesk — publicly acknowledged that Vault connectivity was impacted by the October updates and recommended rollback where necessary.
Community troubleshooting coalesced quickly: Microsoft engineers and independent responders pointed to changes in HTTP/2 and TLS handling introduced by the updates as the likely root of the regressions. Multiple practical mitigations emerged almost immediately: update Microsoft Defender security intelligence, toggle HTTP/2 at the OS HTTP stack level via registry keys, or uninstall the offending KBs and pause updates until a fix ships. Each option has pros and cons; this article explains them and gives step‑by‑step guidance for safely testing and applying mitigations.

What’s actually failing — technical overview​

Symptoms observed in the field​

  • Browsers report ERR_CONNECTION_RESET or ERR_HTTP2_PROTOCOL_ERROR when hitting localhost URLs served by IIS/IIS Express. Requests fail during TLS/HTTP negotiation for many stacks.
  • Visual Studio projects that rely on IIS Express fail to start for debugging — developers see exceptions like HttpListenerException: 50 (“The request is not supported”) when a local HttpListener or IIS‑bound service is used.
  • Some enterprise products (for example, Autodesk Vault) saw Vault Client-to-Server connections fail until the updates were removed. Vendor forums and pinned community posts confirm widespread operational impact.

Likely technical cause (current consensus and caveats)​

Several experts and Microsoft staff pointed to an HTTP/2/TLS negotiation regression introduced or exposed by the updated HTTP stack and related components in KB5066835. The update appears to change default protocol behavior in a way that breaks certain local loopback TLS/HTTP/2 flows that IIS and IIS Express previously tolerated. There is also community analysis that traces related compatibility issues back to TLS 1.3 and post‑handshake client-auth semantics (a related but not identical interoperability area). The exact, single-line root cause remains Microsoft’s responsibility to document formally; community triangulation strongly implicates HTTP/2 negotiation behavior introduced or hardened by the patch.
Caveat: while HTTP/2 negotiation is the dominant hypothesis and produces consistent reproductions, not every affected machine shows identical failure modes — some systems required removal of multiple KBs (KB5065789 alongside KB5066835) to regain functionality, and Defender definition updates reportedly fixed others. That variability means the underlying regression can interact with local configuration, installed security products, and existing IIS bindings. Treat the root cause as a compatibility regression with several observable failure modes rather than a single deterministic bug.

Quick assessment: how to decide what to do​

Before applying any of the mitigations below, inventory and assess impact:
  • Identify which hosts rely on local IIS/IIS Express (developer workstations, build/CI agents, servers hosting management UIs).
  • Determine whether the service in question uses HTTP/2 by default (modern clients/servers often prefer it).
  • Catalog installed security agents and device management policies (some EDR and antivirus hooks can change TLS/HTTP behavior).
  • Ensure rollback options exist: recovery image, restore point, or documented uninstall procedures for the KBs.
If the environment includes production systems or users worldwide, start with non-invasive checks (Defender intelligence update), move to non-destructive mitigations (registry toggle / HTTP/2 disable on a test box), and only uninstall updates as a last resort after testing rollback/patch freeze plans.

Practical mitigations and step‑by‑step instructions​

The community has converged on a short list of practical mitigations. These are ordered from least disruptive to most disruptive.

1) First try: update Microsoft Defender’s security intelligence definitions​

Why: Several administrators reported that installing the latest Microsoft Defender Security Intelligence update restored IIS behavior on affected machines where uninstalling the KBs was not an option. This is a low-risk, quick step to try first.
Steps:
  • Open Microsoft Defender (or download Security Intelligence updates manually from Microsoft’s Defender update page).
  • Apply the latest security intelligence package and restart the machine.
  • Test localhost/IIS behavior.
Notes:
  • This is an anecdotal but repeatedly reported fix; it should be tried first on any affected workstation because it’s reversible and non-invasive.
  • If it resolves the issue, follow up by monitoring Windows Update and Defender definition rollouts for related changes.

2) Temporary mitigation: disable HTTP/2 in the Windows HTTP stack (test first)​

Why: Disabling HTTP/2 forces the OS and IIS to fall back to HTTP/1.1 for loopback and other HTTP traffic, avoiding the broken HTTP/2 negotiation path many reports point to. This is a mitigation — it reduces the surface area of the regression without uninstalling security updates.
Registry keys to set:
  • Path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HTTP\Parameters
  • Values (DWORD, 32-bit):
  • EnableHttp2Tls = 0
  • EnableHttp2Cleartext = 0
Step-by-step (GUI):
  • Run regedit as Administrator.
  • Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HTTP\Parameters.
  • Create two new DWORD (32-bit) values named EnableHttp2Tls and EnableHttp2Cleartext, set both to 0.
  • Reboot the computer.
  • Test your local site.
Step-by-step (command line):
  • Open an elevated Command Prompt and run:
  • reg add "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" /v EnableHttp2Tls /t REG_DWORD /d 0 /f
  • reg add "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" /v EnableHttp2Cleartext /t REG_DWORD /d 0 /f
  • Reboot and test.
Notes and warnings:
  • This turns off HTTP/2 at the OS HTTP.sys level; it affects all HTTP.sys consumers on the machine, not only IIS. Test carefully in environments where other services depend on HTTP/2 performance or semantics.
  • Reversal: set the DWORD values to 1 or delete them and reboot.

3) IIS-level tweaks and binding edits​

Why: In some cases disabling HTTP/2 per site or re-creating bindings to explicitly request client certs (for mTLS scenarios) resolves compatibility for targeted services without changing machine-wide settings. This is more surgical but needs administrative rights and careful testing.
Options:
  • In IIS Manager, for the site binding, disable HTTP/2 if that checkbox is exposed by your IIS version.
  • Recreate HTTPS bindings with explicit client-cert negotiation if the app uses client certificates — use netsh http commands and the clientcertnegotiation parameter where supported.
  • For IIS Express, adjust applicationhost.config to remove client-cert requirements for local testing, or move TLS termination to a controllable reverse proxy (Kestrel, Nginx) in dev/CI environments.
Notes:
  • Reconfiguring bindings can be overwritten by Visual Studio or deployment tooling; automate or document the change in your dev environment scripts.
  • Removing client-cert enforcement for dev is acceptable with strong gating and must not be merged into production configuration.

4) Uninstall the KB(s) as a last resort (and pause updates)​

Why: Rolling back KB5066835 — and, in some reports, KB5065789 — reliably restores functionality where the other mitigations fail. This is disruptive and potentially lowers the machine’s security posture, so treat it as a controlled, temporary measure only.
Commands (elevated Command Prompt):
  • wusa /uninstall /kb:5066835
  • Restart.
  • If the problem persists, also run: wusa /uninstall /kb:5065789
  • Restart and test.
Operational guidance:
  • Test rollback on an isolated machine first.
  • If you roll back patches in a managed estate, update change-control and security teams and apply compensating controls (network segmentation, WAF rules) as needed.
  • Pause automatic updates via Windows Update policies until Microsoft issues a fix — but do not leave systems unpatched indefinitely.
Caveats:
  • Some admins reported difficulty uninstalling certain updates (errors from wusa). If uninstall fails, consider in-place repair or a system image rollback path. Document your rollback options ahead of time.

Risk analysis — security, stability and operational cost​

  • Security trade-off: Uninstalling security patches increases exposure to vulnerabilities the KB intended to remediate. If rollback is necessary, limit exposure (air-gap for dev machines, host-only environments) and maintain compensating controls until a vendor fix is available.
  • Operational risk: Machine-wide HTTP/2 disablement can negatively affect performance and interoperability with services that rely on HTTP/2 features. For larger organizations, machine-level changes must be tested in CI and staging before rollout.
  • Reproducibility variability: Some systems required removal of multiple KBs; others fixed with a Defender update. This indicates the regression interacts with local state (third‑party security agents, specific binding configs, or other installed updates). Expect per-host variability and plan a triage runbook.
  • Vendor impact: Commercial products that embed IIS or rely on Windows’ HTTP stack (Autodesk Vault is a confirmed example) may fail for end users, creating support tickets and downtime. Vendor advisories are already recommending rollback until Microsoft provides a fix, which increases pressure on IT teams to coordinate patch policies.

Testing checklist (recommended sequence for a single affected machine)​

  • Reproduce the failure and collect diagnostics:
  • Browser error details, IIS logs, Windows Event Viewer entries, and any exception traces from apps.
  • Install the latest Microsoft Defender Security Intelligence and reboot. Test localhost again.
  • If still failing, apply the HTTP/2 registry toggle on an isolated machine and reboot; test.
  • If that resolves the issue, evaluate whether to apply the registry change broadly, or instead reconfigure per-site bindings where possible.
  • If mitigation fails and the host is critical: plan a controlled uninstall of KB5066835 (and KB5065789 if required), reboot, and verify. Log every step and maintain recovery points.

Enterprise rollout guidance​

  • Pilot first: Test mitigations on a small set of representative workstations, build agents and servers. Measure functional success and side effects.
  • Communication: Inform developers and helpdesk staff that a workaround or rollback is being evaluated; provide a clear escalation path.
  • Automation: If registry toggles are adopted, deploy via Group Policy Preferences, Intune, or a management automation tool; include a reversal runbook.
  • Monitoring: Add an alert for failed connections to management services or CI test runners that use localhost to detect regressions quickly.
  • Vendor coordination: Track vendor advisories (for products like Autodesk Vault) and coordinate fix timelines with application owners.

What Microsoft has said (and what remains unresolved)​

Microsoft support staff and Microsoft Q&A community posts acknowledged the correlation between KB5066835 and the IIS/localhost regressions and recommended the mitigations described above while engineers investigate. The company’s external staff responses and community threads are consistent: the update introduced protocol-level behavior changes that break some local HTTP/2/TLS patterns, and Microsoft engineers are working on a remediation path. A formal, consolidated Microsoft KB-level explanation and hotfix timeline had not been published at the time reports first appeared; follow Microsoft Update channels for an official patch.
Flag: Until Microsoft releases an official hotfix or consolidated guidance, some technical assertions about the exact low-level code change that triggered the regression remain community-derived. Treat those as informed analysis rather than a definitive vendor root-cause statement.

Short checklist for developers (condensed)​

  • Try Defender definition update and reboot (fast, low-risk).
  • If still broken, test the registry HTTP/2 disable on an isolated machine: set EnableHttp2Tls=0 and EnableHttp2Cleartext=0 under HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters and reboot.
  • Consider running Kestrel or a reverse-proxy as a dev-only TLS termination until the issue is fixed. This bypasses IIS’s HTTP.sys behavior.
  • Only uninstall the KB(s) if you have a rollback plan and a short maintenance window; pause Windows Updates for affected machines after rollback.

Final assessment — strengths, risks and the takeaway​

Strengths of the available mitigations:
  • A practical, low-risk first step exists (Defender update) that resolved the problem for many users.
  • An OS-level mitigation (disable HTTP/2) is simple to script and quick to test on isolated systems with minimal permanent change.
Risks to watch:
  • Disabling HTTP/2 reduces protocol-level performance and feature benefits; teams must balance usability against security/compatibility.
  • Uninstalling security updates creates exposure that must be mitigated via compensating controls.
  • The regression’s variable behavior means a one-size-fits-all response may not work; expect per-host troubleshooting.
Takeaway:
This incident reinforces a perennial truth for IT operations and developer tooling: updates that harden protocol behavior (HTTP/2, TLS defaults) can surface long‑standing compatibility assumptions in middleware and tooling. The immediate path for most teams is pragmatic: try the Defender definition update first, test the HTTP/2 registry toggle in an isolated environment, and only resort to KB uninstall when necessary — with a well-documented rollback and compensating controls in place. Monitor Microsoft’s official channels closely for an authoritative fix and plan to reverse temporary mitigations once the vendor patch arrives.

If affected systems are critical to production, coordinate changes with security and application teams before mitigation; for developers, document any binding or configuration changes in project repositories so CI and teammates are not surprised. The community has produced reproducible workarounds that restore local web hosting quickly, but each choice carries measurable trade-offs that must be managed.

Source: PiunikaWeb Latest Windows 11 update kills localhost IIS — here are the workarounds
 

Microsoft's October cumulative update for Windows 11 (KB5066835) has left a large slice of the developer community staring at dead localhost connections, with IIS/IIS Express sites, Visual Studio debugging sessions and a range of developer tools failing to reach services that are supposed to be running on the same machine. The problem — traced to the OS HTTP stack (HTTP.sys) and manifesting as HTTP/2 negotiation errors and connection resets — arrived with builds 26100.6899 and 26200.6899 and has forced rushed rollbacks, registry workarounds and emergency changes to developer patch policies across teams.

Web browser shows ERR_HTTP2_PROTOCOL_ERROR on localhost with an Attach-to-Process dialog.Background​

Windows 11's October 14, 2025 cumulative update (KB5066835) shipped as part of Patch Tuesday and updated systems to OS builds 26100.6899 (24H2) and 26200.6899 (25H2). The package bundled security fixes and quality improvements, but within hours developers began reporting that http://localhost and https://localhost connections stopped working, returning errors such as ERR_HTTP2_PROTOCOL_ERROR or outright connection resets when trying to reach local IIS or IIS Express sites.
Community posts, Stack Overflow answers and Microsoft’s own Q&A forum quickly filled with reports from developers and sysadmins who could no longer run and debug web applications locally. Symptoms included browser error pages when navigating to localhost, Visual Studio failing to attach the debugger to IIS Express sites, and third-party desktop apps that rely on local loopback services becoming inaccessible. The issue appears broadly correlated with changes in how the Windows HTTP stack negotiates HTTP/2 and handles TLS when talking to loopback addresses.

What’s failing and how it shows up​

  • Browsers display ERR_HTTP2_PROTOCOL_ERROR or ERR_CONNECTION_RESET when navigating to localhost-hosted sites.
  • Visual Studio debugging sessions that rely on IIS/IIS Express fail to launch the site or cannot connect to a running site for breakpoints and hot-reloads.
  • Locally hosted services and management consoles (including vendor software that uses local IIS) fail to respond or show service-level errors.
  • Some users reported that uninstalling KBs or applying certain mitigations restored functionality, while others reported mixed or partial results.
These symptoms are consistent with a regression in HTTP.sys, the kernel-mode HTTP listener in Windows that handles connections for IIS and IIS Express. When HTTP.sys mis-negotiates HTTP/2 frames or mishandles TLS parameters on loopback, the result is protocol-level resets that manifest as the errors observed by developers.

Technical root cause (what the community has pieced together)​

Microsoft’s public KB for the October update confirms the builds and the security scope of KB5066835, but does not contain an immediate line-by-line breakdown of a regression affecting loopback HTTP/2 behavior. Community triage and responses from Microsoft community engineers suggest that a change in the update set affected HTTP/2 behavior in HTTP.sys leading to the failures on localhost. Microsoft staff and forum responders pointed at HTTP/2/TLS negotiation as the immediate fault domain rather than application code.
Key technical observations gathered from community threads:
  • The failure mode is protocol-level: HTTP/2 frames or negotiation attempts are rejected or reset at the HTTP.sys layer.
  • Disabling HTTP/2 at the OS HTTP stack level immediately prevents the protocol negotiation from occurring and restores connectivity — strongly implicating an HTTP/2 regression rather than unrelated network driver issues.
  • Some users found that uninstalling the cumulative update (and in several cases a related preview/servicing update) restored normal behavior, which points to a change introduced by those updates rather than a pre-existing latent bug on every system.
Caveat: the exact low-level code change inside HTTP.sys (for example, a malformed state machine, incorrect header handling, or TLS handshake behavior) has not been published by Microsoft as a root-cause patch note at the time these reports circulated; the community diagnosis is strong but not an official vendor root-cause statement. Treat the low-level assertion about HTTP.sys internals as informed, community-derived analysis until Microsoft publishes a formal technical post-mortem.

Reproducing the issue (observed patterns)​

  • Install Windows Updates when KB5066835 begins rolling out (systems that received build 26100.6899 / 26200.6899).
  • Attempt to navigate to a local site hosted by IIS or IIS Express using http://localhost or https://localhost.
  • Observe browser errors (ERR_HTTP2_PROTOCOL_ERROR / connection resets) or Visual Studio failing to start/attach.
  • Some users who attempted a rollback of KB5066835 reported restoration of service; others had to remove additional KBs (e.g., KB5065789 or related .NET/security patches) before localhost returned.
Reproduction appears consistent across multiple environments but not strictly universal — some freshly installed or recently imaged machines reported normal behavior, while long-lived upgraded machines manifested the bug more often. This suggests an interaction between the update and pre-existing machine state or configuration rather than a simple binary fault that affects every possible Windows 11 install.

Short-term mitigations that worked (and their trade-offs)​

Community-sourced mitigations emerged within hours. Each is viable depending on your environment and risk tolerance.
  • Update Microsoft Defender Security Intelligence definitions and reboot.
  • Why: multiple users reported that installing the latest Defender definition update resolved the issue for them. It’s a low-cost first step and should be tried before more invasive actions. This is not guaranteed to fix every case but is worth attempting.
  • Disable HTTP/2 at the OS HTTP stack level (registry tweak)
  • Registry keys to set (requires admin, then reboot):
  • HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\EnableHttp2Tls = 0 (DWORD)
  • HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\EnableHttp2Cleartext = 0 (DWORD)
  • Effect: forces the OS HTTP stack to avoid HTTP/2 negotiation and fall back to HTTP/1.1 for TLS and cleartext, restoring localhost connectivity in many cases.
  • Trade-offs: disables HTTP/2 globally which can degrade performance in environments where HTTP/2 was beneficial. This is a blunt instrument and should be used temporarily and in controlled environments (developer machines, test rigs) rather than across production fleets without evaluation.
  • Uninstall KB5066835 (and, if necessary, KB5065789 / sibling updates)
  • Commands (run elevated Command Prompt):
  • wusa /uninstall /kb:5066835
  • Restart
  • If still broken, wusa /uninstall /kb:5065789 (or other KBs identified in your environment)
  • Restart and test.
  • Effect: rolling back the update restored localhost on many reported systems.
  • Trade-offs: uninstalling a cumulative security update reduces the device’s security posture and must be treated as a time-limited mitigation. If you roll back patches, plan compensating controls and communicate with security and compliance teams. Some users also reported uninstall errors or inability to remove certain KBs, so test uninstall on a non-critical machine first.
  • Workaround at application layer
  • Use Kestrel (for ASP.NET Core) or a developer reverse proxy that bypasses HTTP.sys for local development.
  • Bind to 127.0.0.1 explicitly and/or consider moving TLS termination out of local IIS and into a process you control.
  • Effect: reduces reliance on the OS HTTP stack for local dev and is a safer long-term practice for test/CI environments.
Each mitigation carries trade-offs in security, performance, manageability and scale. The registry method is fast and scriptable but broad; uninstalling updates restores baseline behavior but re-exposes devices to security fixes; and application-layer workarounds need developer time and environment management.

Recommended immediate actions for developers and sysadmins​

  • Thread your response through a risk-controlled process: if you manage developer images or build agents, stop the automatic deployment of KB5066835 to those systems until your team tests the update in an isolated environment.
  • Try the low-risk fix first: install the latest Microsoft Defender security intelligence update and reboot. Several reports indicate this fixed the issue for some systems.
  • If that fails and you need immediate remediation on dev machines, apply the HTTP/2-disable registry keys on isolated development machines only. Log the change, script the rollback, and schedule a follow-up when Microsoft publishes a patch.
  • If environments cannot tolerate the registry workaround, test rollback of KB5066835 on a non-production machine and evaluate the impact before broad rollbacks.
  • For production servers that expose loopback interfaces to local apps, consider short-term application-layer changes (local reverse proxy, explicit HTTP/1.1 bindings) to avoid depending on HTTP.sys behavior while a vendor fix is prepared.
  • Monitor Microsoft channels for an official consolidated guidance or hotfix — Microsoft community staff and engineers are monitoring Q&A threads and community reports, but a formal vendor patch is the safest resolution.

How Microsoft has responded (so far)​

Microsoft’s official October 14 KB entry confirms the builds and describes the security/quality scope of KB5066835, but the vendor’s customer-facing KB page did not initially include a consolidated note about the development-localhost regression. Microsoft community moderators and external staff engaged on Microsoft Q&A and support forums acknowledged the correlation between the update and IIS/localhost regressions and suggested mitigations while engineering investigations continued. Microsoft indicated that multiple threads and responses were being used to triage the issue, but a single consolidated hotfix and an explicit root-cause blog post were not available at the same time community reports surfaced.
Note: Some community reports and a Microsoft Q&A responder observed that a fresh installation of Windows 11 (fully updated post-install) did not always reproduce the issue, suggesting that the regression may depend on existing system state or configuration on upgraded systems. This observation remains community-sourced and not uniformly reproducible; more controlled testing is necessary to confirm whether clean installs consistently avoid the bug. Treat claims that “fresh installs are immune” as provisional.

Why this matters: broader implications and risks​

  • Developer productivity: Localhost is a basic dependency for millions of developers and devops engineers. A patch that breaks loopback connectivity impairs rapid development loops, continuous integration tests, local debugging, and internal tooling.
  • Enterprise risk posture: The easiest immediate repair — uninstalling cumulative security patches — reduces defense-in-depth. That leaves teams with a harsh trade-off: accept reduced developer productivity or accept a heavier attack surface. Both have organizational consequences.
  • Patch testing and rollout: This incident highlights the complexity of shipping changes that touch kernel-mode networking stacks. Even high-quality testing programs can miss interactions with long-standing local configuration patterns, third-party drivers or application-specific bindings.
  • Ecosystem fragility: Many closed-source vendor products and internal tools depend on Windows' existing HTTP stack semantics. Rapid changes to that stack ripple into those systems unexpectedly.
  • Public trust and communication: The speed and clarity of vendor communication during regressions strongly affects admin and developer confidence. Early acknowledgement and clear guidance on remediation (including the trade-offs) reduces wheel-spinning and helps IT managers choose a defensible path.

Practical checklist for Windows Forum readers (concise)​

  • If you need localhost to run now:
  • 1) Try updating Defender security intelligence, then reboot.
  • 2) If that fails, test the registry HTTP/2 disable on a non-prod/dev machine and reboot.
  • 3) If still broken, rollback KB5066835 (and KB5065789 if applicable) on an isolated system and test. Document the rollback process.
  • If you manage many developer machines:
  • Pause automatic installation of these KBs into your developer pool until you can validate them in an isolated test ring.
  • Consider shifting rapid-build workloads to clean, controlled images that you can snapshot and restore.
  • If you manage servers:
  • Don’t broadly uninstall security updates without a clear maintenance window and compensating controls; instead prioritize server-level workarounds and vendor-supplied guidance.
  • Long-term: push for CI pipelines and local development setups that do not assume kernel-level features are stable forever — prefer explicit, controllable stacks (Kestrel, dockerized apps, reverse-proxy) where feasible.

Critical analysis: Microsoft’s release cadence vs. systemic testing​

Microsoft’s monthly cumulative update cadence is essential to eliminate vulnerabilities and maintain a secure platform at scale. But touching a widely used, kernel-level component like HTTP.sys requires extra rigour because it is a common dependency for both web servers and many third-party applications.
Strengths observed in this episode:
  • Rapid community triage. Developers and admins quickly converged on practical mitigations (Defender update, registry steps, rollbacks) and shared reproducible guidance.
  • Microsoft community staff engaged quickly on Q&A forums, providing interim advice and acknowledging correlations.
Risks and weaknesses revealed:
  • A critical path in the update pipeline allowed a regression into a widely used subsystem.
  • The variance in behavior between upgraded systems and some clean installs suggests that interaction with pre-existing system state was not fully accounted for by testing pipelines.
  • The immediate “fixes” available to many users involve either disabling protocol features globally or uninstalling security updates — neither is ideal at scale.
Enterprises and platform vendors should treat this as a reminder to maintain robust test rings that include long-lived developer images, third-party application workloads, and stateful machine configurations, not just clean installs.

Final assessment and recommended posture​

The KB5066835 incident is a high-impact but resolvable regression. Practical mitigations — Defender definition updates, registry-based HTTP/2 disablement, or uninstalling the offending KBs — are available now and have restored functionality for many users. However, each mitigation carries trade-offs and none are a substitute for a targeted vendor hotfix.
Recommended posture for teams:
  • Treat developer endpoints differently from production servers: isolate and test updates in a canary ring before full deployment.
  • Use the registry workaround as a stopgap on non-production machines only; plan to revert when Microsoft issues a targeted fix.
  • Avoid broad rollback of security updates across production fleets unless absolutely required; coordinate with security, operations and business stakeholders if you need to do so.
  • Monitor Microsoft’s official channels for an explicit hotfix and formal root-cause follow-up.
This episode is a reminder that even the most familiar subsystems — localhost, loopback and HTTP.sys — are critical infrastructure that require careful handling during patch cycles. The fixes available today will restore developer workflows, but the larger lesson is to build testing and recovery paths into update plans so that productivity and security do not become a zero‑sum choice.

Conclusion
A seemingly routine cumulative update broke a fundamental developer expectation — that a machine can talk to itself. The community response was fast and pragmatic: low-risk updates first, then registry mitigation, then rollback if needed. Enterprises and development teams should use this event to harden update testing, document rollback and mitigation procedures, and treat kernel-level networking changes with extra scrutiny. Until Microsoft publishes a targeted hotfix and a full technical post-mortem, the safest approach is cautious, measured mitigation combined with close coordination between development, operations and security teams.

Source: theregister.com Microsoft update breaks localhost in Windows 11
 

Microsoft’s October cumulative update for Windows 11 (KB5066835) has triggered a widespread and disruptive regression: developers, sysadmins and vendors are reporting that localhost — the loopback hostname used to reach services running on the same PC — stops responding after the patch, producing ERR_CONNECTION_RESET and ERR_HTTP2_PROTOCOL_ERROR errors for IIS, IIS Express and a raft of locally hosted applications.

Blue tech collage showing 127.0.0.1 with HTTP errors and developer tools.Background / Overview​

The October 14, 2025 cumulative update (KB5066835) was published as Microsoft’s regular Patch Tuesday release for Windows 11 (24H2 and 25H2 builds), and included a set of security fixes and quality improvements. Within hours of the rollout, community forums, Stack Overflow, Microsoft Q&A and vendor support boards filled with reports that websites and web services bound to localhost (127.0.0.1 and ::1) were failing to load, that Visual Studio could not debug IIS/IIS Express sites, and that third‑party applications relying on local HTTP listeners had lost functionality.
The failure mode observed across many reports points to protocol-level negotiation problems during connection setup — in short, HTTP/2 negotiation and TLS handling on the Windows HTTP stack appear to be involved. Several community responders and Microsoft forum contributors have identified the operating system HTTP stack (the kernel‑mode http.sys driver used by IIS and other system components) as the likely locus of the regression.
Microsoft’s KB release note for KB5066835 lists the update’s improvements and security fixes but — critically — does not call out http.sys, HTTP/2, or localhost-related regressions in the public release notes at the time the outage surfaced. That lack of a documented “known issue” left administrators scrambling to identify a cause and workable mitigations.

What exactly is broken (symptoms and scope)​

Typical symptoms reported​

  • Browsers attempting to reach http://localhost or https://localhost show ERR_CONNECTION_RESET or ERR_HTTP2_PROTOCOL_ERROR.
  • Visual Studio projects that launch or debug using IIS / IIS Express fail to start or attach; developers report HttpListenerException-type errors and failed breakpoints.
  • Management consoles and vendor applications that communicate over a local loopback HTTP interface cease to respond.
  • Some users reported firewall or networking anomalies (for example, missing inbound rules) after the patch in separate reports, indicating the update may interact with multiple subsystems for some configurations.

Who is affected​

The issue appears concentrated on Windows 11 systems upgraded to the October 14, 2025 build numbers (24H2 build 26100.6899 or 25H2 build 26200.6899). Reports are strongest from developers using IIS / IIS Express and from customers running vendor software that embeds or relies on localhost HTTP services. Community testing has shown freshly installed, fully patched Windows 11 images sometimes do not reproduce the problem — suggesting the regression may be sensitive to preexisting configuration, third‑party components, or state carried forward during upgrades. The total number of affected systems is unknown.

The technical angle: http.sys, IIS, and HTTP/2​

Why http.sys matters​

Windows’ HTTP stack is rooted in a kernel‑mode driver, http.sys, which accepts HTTP connections and forwards them to user‑mode servers such as IIS or applications that use HttpListener. This design goes back to IIS 6 / Windows Server 2003 and remains the foundation for HTTP handling in modern Windows releases; when http.sys mishandles frames or TLS parameters, the impact cascades to IIS, IIS Express and any app that leverages the kernel HTTP listener.

HTTP/2 negotiation and registry controls​

IIS and the Windows HTTP stack support HTTP/2 (typically over TLS). Windows exposes runtime controls and registry flags that influence HTTP/2 behavior and its limits (for example, Http2MaxSettingsPerFrame, Http2MaxSettingsPerMinute, EnableHttp2Tls, and EnableHttp2Cleartext). Administrators can add or change these registry values under HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters to tweak or disable HTTP/2 support. That same registry surface is being widely used as a workaround to disable HTTP/2 when the protocol negotiation fails after the October cumulative update. Microsoft published guidance for HTTP/2 settings in prior updates for other issues, and multiple vendor advisories show the same registry keys used as mitigations in the field.

Confirmed mitigations and workarounds​

Multiple independent workarounds have been surfaced by the community and Microsoft forum posts. None are risk‑free; each carries trade‑offs that must be weighed against the value of keeping the October security fixes installed.
Key mitigations reported and how they behave:
  • Uninstall KB5066835 (and in some reports KB5065789 as well). Several users recovered localhost functionality after removing the October cumulative and, in particular situations, also removing the related September package. Note: some combined packages include a servicing stack update (SSU) and cannot be removed via wusa; Microsoft’s support pages explain the combined LCU+SSU package behavior. Use caution — removing a security LCU exposes the system to the vulnerabilities the update fixed.
  • Disable HTTP/2 in the OS HTTP stack by setting registry values to turn off HTTP/2 (practical example below). Multiple users confirmed this restored localhost behavior while keeping KB5066835 installed. This bypasses HTTP/2 negotiation entirely and forces fallbacks to HTTP/1.1, which is usually sufficient for local development and avoids modifying application code. However, disabling protocol capabilities in the OS is blunt and may affect performance characteristics and modern features.
  • Apply a Microsoft Defender Security Intelligence update. Some community reports indicate that installing the latest Defender intelligence update restored IIS/localhost in particular cases — an odd but reported correlation; this has not been universally reproducible and is not an official fix for an HTTP stack regression. Treat this as an anecdotal report until Microsoft confirms.
  • In extreme cases vendors and community responders recommended toggling off Hyper‑V, IIS, the Windows Process Activation Service (WAS), and temporarily disabling .NET versions before attempting uninstall or remediation steps. These are environment‑specific, invasive steps and best used only under guided troubleshooting.

How to disable HTTP/2 at the OS level (practical example — back up first)​

  • Open Registry Editor (regedit) as Administrator.
  • Navigate to: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HTTP\Parameters.
  • Create or modify the following DWORD (32‑bit) values:
  • EnableHttp2Tls → set to 0 (disable HTTP/2 over TLS).
  • EnableHttp2Cleartext → set to 0 (disable cleartext HTTP/2).
  • Reboot the machine.
    Command-line example (Administrator PowerShell or CMD):
  • reg add "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" /v EnableHttp2Tls /t REG_DWORD /d 0 /f
  • reg add "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" /v EnableHttp2Cleartext /t REG_DWORD /d 0 /f
Warning: editing the registry can break systems if done incorrectly. Back up registry keys or create a system restore point before changing values. Reversing the change requires deleting the DWORDs or setting them back to 1 and rebooting. This registry approach has been widely cited as a temporary mitigation in community threads.

Recovery and removal details: the gotchas​

  • WUSA uninstall may not work for combined LCU+SSU packages. Microsoft’s KB for KB5066835 notes that the combined update pairs the latest servicing stack update with the LCU; in some cases you cannot remove the SSU. Microsoft shows using DISM /online /get-packages to locate and remove LCUs by package name when wusa fails. This complexity means some administrators who attempted to roll back the patch hit friction when the SSU was included. Always follow Microsoft’s guidance and create a backup before attempting an LCU/SSU rollback.
  • Removing security updates carries risk. The October cumulative addresses multiple security issues; uninstalling the LCU potentially exposes systems to vulnerabilities that the update patched. For production environments, consider isolating development hosts, blocking outward exposure, or using VMs with alternate patch policies until Microsoft releases an official fix or Known Issue Rollback (KIR).

Microsoft’s response and where the investigation stands​

As of the initial surge of reports, Microsoft’s public KB page for KB5066835 did not document an http.sys or localhost regression as a known issue; community troubleshooting proceeded in the absence of an immediate official acknowledgement. Microsoft’s own Q&A forum shows active threads where engineers and Microsoft community staff are monitoring and responding; a Microsoft contributor summarized that symptoms look related to HTTP/2 protocol handling and IIS service failures after KB5066835. That indicates Microsoft engineers are aware of the pattern even if a formal “known issue” entry or KIR had not been published at the time of early reports. Administrators are encouraged to monitor Microsoft’s Release Health and the KB page for updates.

Why did this slip through testing? A critical look​

This regression highlights several risk vectors in large OS update rollouts:
  • Complex state and upgrades: OS updates must run across a nearly infinite variety of system states (previous patches, registry tweaks, third‑party network filters, virtualization layers such as Hyper‑V, vendor drivers). Some regressions only surface on upgrades from older cumulative baselines, not on “clean” installs, which can make them difficult to reproduce in limited lab test matrices. Multiple reports claiming fresh installs were unaffected support this hypothesis.
  • Kernel‑mode surface area is unforgiving: http.sys is a kernel driver and changes that touch protocol negotiation or TLS behavior can have broad and immediate consequences for any software that binds the HTTP stack. Kernel regression tests are essential but may not catch subtle negotiation edge cases triggered by specific application behaviors or vendor modules.
  • The tradeoff between security and stability: Monthly Patch Tuesday packages often contain critical fixes that must be distributed quickly. That urgency can compress testing cycles for less‑common configuration permutations. When administrators choose to uninstall a security update to regain functionality, they face a direct security tradeoff. The community’s rapid push to identify registry mitigations reflects the pressure to preserve both security and functionality in production and development contexts.

Practical guidance for Windows admins and developers​

  • For single‑developer workstations: If you need immediate, low‑risk access to your local dev environment, consider disabling HTTP/2 via the registry (back up first) or revert the update on a non‑critical machine. Afterward, watch for Microsoft guidance and reapply the update once the fix is published.
  • For production or corporate environments: Do not casually uninstall security LCUs on servers exposed to networks. Instead:
  • Isolate affected systems from external networks if possible.
  • Use virtual machines or snapshots to validate rollbacks.
  • Engage vendor support if third‑party products are affected — some vendors may recommend targeted mitigations or have hotfixes.
  • Monitor Microsoft Release Health and the KB page for an official known‑issue notice and corrective update.
  • If wusa won’t uninstall the package: Follow Microsoft’s documented DISM procedure to enumerate and remove the offending LCU package name, but be aware of SSU constraints and test in a safe environment first.
  • Use logging and reproducible tests: Capture browser network developer traces, IIS logs, Event Viewer entries, and Http.sys traces if possible. These help Microsoft and vendors reproduce edge cases and accelerate a fix.

Broader implications: release quality and trust​

This incident is a reminder that even mature, widely deployed OS components can be fragile at gateways where security, performance, and compatibility meet. The Windows ecosystem must balance rapid patching for critical vulnerabilities with exhaustive compatibility checks across a diverse installed base. For administrators, this incident reinforces the need for staging updates where possible, using canary groups or test rings for critical systems, and maintaining rollback plans that are tested before crisis time.
Microsoft’s practice of documenting known issues and issuing Known Issue Rollbacks (KIRs) when needed is essential; the speed and clarity of that communication materially affect enterprise risk decisions. In cases where a security LCU breaks core functionality, the absence of an immediate KIR forces painful choices for admins — keep the patch and lose functionality, or remove the patch and accept exposure — and that’s precisely the dilemma being reported in community threads.

What to watch next​

  • Microsoft’s Release Health dashboard and the KB5066835 page for updates and any posted mitigation or KIR.
  • Vendor advisories for third‑party products that embed local web services — many vendors will publish guidance if their customers are affected.
  • Community testing outcomes: registry mitigations and Defender intelligence reports are being discussed widely; track reproducible confirmations from multiple independent sources before applying any mitigation broadly.

Conclusion​

The KB5066835 outage underscores the recurring reality of modern patch management: critical security updates are necessary, but the environments they land on are heterogeneous and sometimes fragile. When a kernel‑level HTTP stack change touches the fundamental mechanism developers and many applications depend on — localhost — the fallout is immediate and highly visible.
Short‑term mitigations are available (disabling HTTP/2 via registry, uninstalling the LCU on isolated machines, or in some anecdotal cases applying Defender intelligence updates), but each choice carries trade‑offs. Administrators and developers must balance restoring local productivity against the security risks of rolling back critical fixes. The most responsible path for widespread environments is careful testing, staged rollouts, and close monitoring of Microsoft’s official guidance for a formal fix or Known Issue Rollback. In the meantime, maintain backups, use virtualized sandboxes for development, and follow Microsoft’s channels for the authoritative update.

Source: TechSpot Windows 11 wrecks localhost functionality with latest cumulative update
 

Microsoft’s October cumulative update for Windows 11 (KB5066835) shipped as a routine Patch Tuesday rollup but quickly produced an outsized and visible regression: developers and some vendors reported that localhost—the loopback hostname that lets apps talk to services on the same PC—stopped responding, breaking IIS/IIS Express, Visual Studio debugging, and local web-based management consoles. Within hours the problem spread across forums, vendor support channels and social media, driving emergency workarounds that trade functionality for security and leaving IT teams with a difficult choice between keeping the October security fixes or restoring developer productivity.

Monitor shows a red KB5066835 error banner over IIS Express with RegEdit.Background / Overview​

Microsoft released the October 14, 2025 cumulative update identified as KB5066835 for Windows 11 (OS builds 26100.6899 for 24H2 and 26200.6899 for 25H2). The package was framed as a standard security-and-quality rollup and included a variety of bug fixes and small user-facing improvements, but it did not initially call out the loopback/localhost regression. Shortly after deployment, reports surfaced showing browsers and developer tools failing to reach services bound to 127.0.0.1 and ::1.
The failure mode is highly visible because it impacts day‑to‑day development workflows: you run a web app locally and suddenly the browser or Visual Studio can’t connect. That immediacy is what turned a routine LCU into a major operational headache for developers, QA teams and some ISVs.

What broke and how it shows up​

Symptoms observed in the field​

  • Browsers returning ERR_HTTP2_PROTOCOL_ERROR or ERR_CONNECTION_RESET when navigating to http://localhost or https://localhost-hosted sites.
  • Visual Studio projects using IIS Express failing to start or attach the debugger, breaking breakpoints, hot-reload and edit-and-continue cycles.
  • Third‑party desktop products that embed local web services (reported examples include enterprise apps such as Autodesk Vault) losing connectivity until the offending updates were removed.
  • Mixed reproduction: some freshly-imaged or clean installs didn’t reproduce the problem, suggesting a stateful interaction with pre-existing configurations or installed components.

The immediate technical fingerprint​

Community triage and Microsoft engineers on support channels pointed to a regression in the Windows HTTP stack—specifically HTTP.sys, the kernel-mode HTTP listener that handles loopback and IIS traffic. The symptom set (protocol resets during HTTP/2 negotiation, TLS handshake anomalies) strongly implicates a change in how HTTP/2 and TLS are handled on loopback addresses after the update. That assessment is consistent across independent community posts, the Microsoft Q&A threads and third‑party reporting.

Why HTTP.sys and HTTP/2 matter for localhost​

HTTP.sys runs in kernel mode and is the central listener for HTTP traffic destined for user-mode servers like IIS and processes using HttpListener. Because it sits below web servers, any regression there affects a broad range of software that relies on loopback networking—IDEs, test harnesses, desktop clients and internal toolchains.
HTTP/2 negotiation and TLS parameters are particularly sensitive: when HTTP.sys mishandles frame negotiation or client-auth semantics, the connection fails before reaching the user-mode server. Disabling HTTP/2 forces the stack to fall back to HTTP/1.1 and, in many reports, restores connectivity—hence the mitigation that circulated immediately. But flipping protocol behavior at the OS level has implications for performance, behavior and security properties.

How broadly this hit: who and what​

Developers​

Local web development workflows were the obvious frontline casualties. Debugging web apps, running integration tests that spin up local servers, and using dev tools that expose web dashboards all depend on localhost functioning correctly. A breakdown there halts iteration cycles and can block CI verification steps.

Enterprises and ISVs​

Some enterprise software embeds local web interfaces or relies on local IIS bindings for inter-process communication. Vendors reported customer incidents and recommended rollbacks in affected environments. That changed this from a developer nuisance into a support and change‑management problem for IT teams.

Variation by environment​

The issue was most commonly reported on machines upgraded to the October 2025 builds (26100.6899 and 26200.6899). Several community posts noted a startling detail: clean installs of the same build sometimes did not reproduce the issue, implying the update interacted with pre-existing state, drivers, or product configurations on upgraded systems. That variability complicates enterprise response and testing.

Mitigations, trade-offs and immediate fix options​

When a security LCU breaks core functionality, organizations face three crude but pragmatic options: fix, mitigate or roll back. The community and Microsoft support threads converged on several recurring mitigations; each has pros and cons.

1) Apply the Microsoft Defender definitions update (try first)​

Some affected users reported that updating Microsoft Defender’s security intelligence database restored localhost connectivity. The mechanism is unclear and this was not a universal fix, but it’s a low-risk first step before invasive mitigations. Test this first on affected machines.

2) Disable HTTP/2 at the OS HTTP.sys level (workaround)​

Setting registry values to force HTTP.sys to avoid HTTP/2 negotiation has become the most widely shared mitigation because it restores local connectivity without uninstalling security updates.
  • Registry path:
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HTTP\Parameters
  • DWORD values to create/set:
  • EnableHttp2Tls = 0
  • EnableHttp2Cleartext = 0
Steps (concise):
  • Run regedit as Administrator.
  • Create the two DWORD (32-bit) values under the path above and set them to 0.
  • Reboot the machine.
Command-line equivalent:
  • Open an elevated Command Prompt and run:
  • reg add "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" /v EnableHttp2Tls /t REG_DWORD /d 0 /f
  • reg add "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" /v EnableHttp2Cleartext /t REG_DWORD /d 0 /f
  • Reboot and test.
Trade-offs:
  • This is a machine-wide change that disables HTTP/2 for all HTTP.sys consumers, not just IIS. Expect reduced HTTP/2 performance and the loss of HTTP/2-specific behavior for affected services.
  • It’s a stopgap: disablement is a blunt instrument until Microsoft ships a targeted fix.

3) Recreate or edit IIS bindings / per-site workarounds​

In some cases, re-creating site bindings or toggling per-site HTTP/2 support (where available) can address the issue without global registry changes. This approach is more surgical but often more complex and brittle—Visual Studio or deployment tooling may overwrite bindings. Suitable for targeted troubleshooting where only a few sites are impacted.

4) Uninstall the offending KB(s) and pause updates (rollback)​

Many reports show that uninstalling KB5066835 (and in some situations KB5065789, a related servicing package) restored localhost behavior. Uninstall is effective but dangerous: it removes security fixes. If an organization chooses rollback:
  • Plan a maintenance window.
  • Ensure compensating security controls (network segmentation, extra monitoring) are in place.
  • Pause automatic Windows Update on affected hosts until a proper fix ships.
Caveats:
  • Some combined SSU+LCU packages cannot be cleanly removed with wusa.exe. Microsoft’s KB pages explain the combined-package behavior; admins must confirm uninstallability for their specific package.

Step-by-step rollback and mitigation checklist (practical guidance)​

  • Verify symptom reproducibility and collect evidence:
  • Capture browser errors (ERR_HTTP2_PROTOCOL_ERROR), IIS logs, Event Viewer entries and Visual Studio error messages.
  • Confirm OS build and installed update package versions (e.g., 26100.6899 / KB5066835).
  • Try the least invasive fix:
  • Update Microsoft Defender definitions and reboot. Re-test.
  • Apply the temporary registry mitigation on an isolated test machine:
  • Add EnableHttp2Tls and EnableHttp2Cleartext = 0 under HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters, reboot and test.
  • If registry mitigation is unacceptable, plan a controlled LCU uninstall:
  • Identify whether the combined package includes an SSU that prevents wusa uninstall; use DISM package removal guidance if available.
  • Schedule rollback with compensating controls (host isolation, extended monitoring).
  • Document changes in your team’s runbooks and reverse the mitigation once Microsoft issues a targeted hotfix or Known Issue Rollback (KIR).

Root-cause confidence and unverifiable elements​

Community investigation and Microsoft Q&A staff point to HTTP.sys / HTTP/2 / TLS negotiation as the proximate cause. That diagnosis is supported by the consistent protocol-level errors and the observation that disabling HTTP/2 restores connectivity. However, the precise low-level code change inside HTTP.sys (for example, whether it’s a header-parsing regression, state-machine logic or a TLS post-handshake change) had not been publicly documented by Microsoft at the time the mitigations circulated. Treat detailed root-cause statements as strong community-derived analysis pending an official Microsoft post‑mortem. Flagged as cautionary: the exact internal patch-level cause remains unconfirmed until Microsoft publishes the technical fix notes.

Why this feels like a “mini‑CrowdStrike moment”​

A recent high-profile Windows patch from a third party (widely discussed in industry circles) previously produced a sudden operational impact across many systems; the KB5066835 localhost regression shares the same visible mechanics: a security/quality update that hardened low-level protocol behavior but also broke implicit compatibility assumptions in middleware and tooling. When kernel-mode networking code changes, the blast radius is large and recovery choices are painful: uninstalling security updates compromises defenses, while workarounds can reduce performance or change semantics. That trade-off—and the public scramble for rollbacks, registry hacks and vendor advisories—creates the same kind of urgent incident mechanics IT teams dread.

Risk analysis for teams and recommended posture​

Short-term risk trade-offs​

  • Uninstalling the LCU removes security mitigations and increases exposure to the vulnerabilities KB5066835 addressed.
  • Disabling HTTP/2 reduces modern protocol performance and may alter client/server behavior in ways that break tests or subtle feature interactions.
  • Keeping the update and accepting disabled local dev workflows blocks developer velocity and may delay releases.

Recommended operational posture​

  • Segment developer machines from sensitive production networks to minimize the security cost of rollback when necessary.
  • Treat developer endpoints and CI agents as a separate update ring: deploy and monitor updates to a canary group (developers, QA) before full rolling to all devs and test agents.
  • Maintain fast rollback scripts (registry toggles, package uninstall commands) and document reversal steps in runbooks.
  • Where vendors are impacted (e.g., Autodesk), follow vendor guidance and coordinate with application owners for targets and patch windows.

Long-term programmatic fixes​

  • Expand update testing to include loopback and dev-tooling scenarios (IIS Express, Visual Studio debug attach, local test harnesses).
  • Use image-based validation to compare behavior on clean installs vs upgraded hosts—this helps spot stateful upgrade interactions.
  • Maintain a small fleet of “dev lab” machines used exclusively to validate monthly cumulative updates before broad developer rollout.

What Microsoft’s public notes and community signals show​

Microsoft’s KB for the October 14, 2025 release documents the package and its improvements but initially did not list a known issue describing the localhost regression—this absence slowed enterprise triage and forced teams to rely on community-sourced mitigations until Microsoft engaged more directly on Q&A. Microsoft engineering staff have been active in support threads and have recommended temporary measures including KB uninstall where necessary, while community responders aggregated mitigations such as the HTTP/2 registry toggle. Administrators should monitor Microsoft’s Release Health Dashboard and the KB page for any updated guidance or a possible Known Issue Rollback (KIR).

Practical takeaways for developers, IT and managers​

  • Developers: If your local web tooling stopped working after mid‑October updates, test the Defender update, then try the HTTP/2 registry toggle on a non-critical machine. If you must uninstall updates, coordinate with security for compensating controls.
  • IT / Ops: Treat this as a reminder to operate at least one canary/test ring that validates updates against real developer workflows—loopback tests should be included. Document rollback and mitigation steps and be prepared to enact them quickly.
  • Security teams: Avoid blanket rollbacks of security updates across production fleets. If rollback is required for developer endpoints, segment and monitor those hosts carefully and prioritize applying the vendor fix when available.

Conclusion​

A routine cumulative update—KB5066835—exposed a fragile dependency between Windows’ kernel HTTP stack and widely used developer tooling, producing a high‑impact outage for local web development workflows. The community response was quick and pragmatic: update Defender first, toggle HTTP/2 to fall back to HTTP/1.1, or, as a last resort, uninstall the patch and pause updates. Each option has real costs, from security exposure to degraded protocol behavior.
This incident underscores two perennial truths: first, kernel-mode networking changes carry a broad blast radius and deserve extra validation against developer scenarios; second, modern patch management must balance security and availability with robust canary testing and rollback playbooks. Until Microsoft publishes a targeted fix and a full technical post‑mortem, teams should apply mitigations conservatively, document actions thoroughly, and prepare to revert temporary workarounds when an authoritative patch is available.

Source: Computerworld A mini-CrowdStrike moment? Windows 11 update cripples dev environments
 

Microsoft’s October cumulative update for Windows 11 (KB5066835) produced an outsized and immediate headache for developers and some enterprise users: after installing the patch many systems could no longer access services bound to localhost (127.0.0.1 / ::1), producing ERR_HTTP2_PROTOCOL_ERROR and ERR_CONNECTION_RESET in browsers, breaking IIS / IIS Express hosted sites and preventing Visual Studio debugging sessions from attaching — forcing a wave of emergency workarounds, KB rollbacks and pointed questions about platform testing and update telemetry.

A computer monitor shows an HTTP/2 protocol error (ERR_HTTP2_PROTOCOL_ERROR) with a server rack and security shield.Background / Overview​

Shortly after Microsoft shipped the October 14, 2025 cumulative update identified as KB5066835 (OS builds 26100.6899 for 24H2 and 26200.6899 for 25H2), developer and admin communities started reporting failures when attempting to reach local web services using http://localhost or https://localhost. Symptoms ranged from browsers showing ERR_HTTP2_PROTOCOL_ERROR and ERR_CONNECTION_RESET, to Visual Studio being unable to debug sites hosted under IIS/IIS Express, to third-party desktop applications that depend on local HTTP servers becoming nonfunctional.
Microsoft’s official KB page for the update lists the security and quality content shipped but — at the time community reports spiked — the KB did not include a consolidated technical explanation addressing the localhost regressions, leaving administrators and developers to triage with community-sourced evidence and Microsoft Q&A interactions.

What happened: technical symptoms and footprint​

How the failure shows up​

  • Browsers connecting to services on localhost return protocol-level errors such as ERR_HTTP2_PROTOCOL_ERROR or simply connection reset pages.
  • Visual Studio projects that rely on IIS or IIS Express fail to start or attach the debugger; developers see exceptions tied to HttpListener behavior.
  • Third‑party desktop products and management UIs that rely on loopback HTTP endpoints (examples reported in community threads include certain access-control and enterprise management tools) lose functionality until a mitigation or rollback is applied.
These are not isolated cosmetic failures: the problem breaks the fundamental expectation that a machine can talk to itself, and because the Windows HTTP stack (HTTP.sys) lives in kernel-mode and forwards traffic to user-mode server processes like IIS, any regression there cascades widely across tooling and applications.

The likely technical locus​

Community triage and Microsoft community engineers converged on a consistent hypothesis: the regression is rooted in changes to the Windows HTTP stack (HTTP.sys) that altered HTTP/2 negotiation and TLS handling on loopback interfaces, causing connections to be reset during protocol negotiation. Multiple independent reports showed disabling HTTP/2 at the OS level restored connectivity in many cases — strongly implicating the HTTP/2/TLS negotiation path rather than purely application-layer bugs. That diagnosis appears across vendor reports, independent outlets and Microsoft Q&A responses.
Important caveat: the exact low-level code change inside HTTP.sys (for example, specific state‑machine behavior, header parsing, or TLS post-handshake semantics) was not publicly documented in a Microsoft post-mortem at the time community mitigations circulated. Treat the HTTP.sys analysis as a strong, community-derived consensus until Microsoft publishes an authoritative root-cause statement.

How broadly this hit (scope and variation)​

The largest concentration of reports came from Windows 11 machines upgraded to the October 14, 2025 KB (builds 26100.6899 and 26200.6899). Notably, several community testers reported clean installs of the same build sometimes did not reproduce the issue, implying the regression interacts with pre‑existing configuration, long-lived upgrade state, or third-party components on upgraded machines rather than being a simple binary failure that affects every installation uniformly. That variability complicated enterprise triage and made a single “one-size-fits-all” fix impossible.
Vendors with products that embed local web services or rely on IIS reported customer incidents and, in at least one case, recommended rolling back updates until a vendor-compatible fix arrives. Those vendor advisories turned a developer nuisance into a support and change-management problem for IT teams.

Immediate mitigations: what worked, and the trade-offs​

When a security cumulative update breaks core functionality, organizations effectively have three pragmatic choices: try low-risk fixes, apply temporary OS-level mitigations, or rollback the update entirely. Each choice has trade-offs that teams must evaluate carefully.

1) Apply Microsoft Defender security intelligence update (try first)​

  • Several affected users reported that installing the latest Microsoft Defender Security Intelligence update and rebooting restored localhost connectivity in some cases.
  • This is a low-cost, low-risk first step and should be tried before more invasive actions, but it is not a universal cure and the mechanism by which a Defender intelligence update would affect HTTP.sys behavior remains unclear. Flag this as community-observed and not confirmed as a root-cause fix by Microsoft.

2) Disable HTTP/2 at the OS HTTP stack level (workaround)​

  • A widely circulated mitigation forces the Windows HTTP stack to avoid HTTP/2 negotiation and fall back to HTTP/1.1. Two commonly used registry settings are:
  • Path: HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters
  • EnableHttp2Tls = 0 (DWORD)
  • EnableHttp2Cleartext = 0 (DWORD)
  • Alternately, some Microsoft Q&A answers suggested placing keys under HKLM\SOFTWARE\Microsoft\IIS\Parameters:
  • EnableHttp2 = 0 (DWORD)
  • EnableHttp2OverTls = 0 (DWORD)
  • Steps (concise):
  • Open an elevated Command Prompt or PowerShell.
  • Create/set the DWORDs under HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters:
  • reg add "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" /v EnableHttp2Tls /t REG_DWORD /d 0 /f
  • reg add "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" /v EnableHttp2Cleartext /t REG_DWORD /d 0 /f
  • Reboot the device.
  • Effect and trade-offs:
  • This often restored local connectivity by avoiding the problematic HTTP/2 negotiation path.
  • It is an OS‑wide, blunt change that disables HTTP/2 benefits globally and can degrade performance or alter behavior for services that depend on HTTP/2. Use as a temporary, scoped mitigation (developer machines, isolated test rigs) and not as a long-term production change unless thoroughly evaluated.

3) Roll back the offending KB(s)​

  • Uninstall the cumulative update with:
  • wusa /uninstall /kb:5066835
  • Restart the machine.
  • In some reported environments, uninstalling KB5066835 restored localhost behavior immediately. Other users found they had to remove a sibling update (for example KB5065789 in some cases) to fully reverse the regression. Be aware that uninstalling security updates reduces the device’s security posture and should be treated as a time-limited mitigation with compensating controls.
  • Practical caution: some users reported difficulties uninstalling the KB via the UI or even command-line; do not attempt a mass uninstall across production fleets without a rollback plan and testing on representative machines.

4) Application-layer or dev-workflow workarounds​

  • Avoid relying on HTTP.sys for local development when possible:
  • Run ASP.NET Core on Kestrel for local dev, or terminate TLS in a user-mode reverse proxy.
  • Bind explicitly to 127.0.0.1 and use a user-mode agent for local TLS termination.
  • Containerize local services (Docker) so the dev environment does not depend on system-level HTTP stack semantics.
  • These options reduce dependency on kernel-level behavior and are safer long-term strategies for teams who want to make dev endpoints more resilient to OS-level regressions.

Step-by-step rollback and mitigation checklist (practical playbook)​

  • Confirm the scope:
  • Reproduce the failure on the affected machine (browser error pages, Visual Studio debug attach failure, HttpListener exceptions).
  • Record OS build number (winver) and installed KBs (Settings → Windows Update → Update history).
  • Try the least invasive fix:
  • Download and install the latest Microsoft Defender Security Intelligence update, then reboot. Test localhost connectivity.
  • If still broken, test HTTP/2 disable in an isolated machine:
  • Create the registry keys under HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters:
  • EnableHttp2Tls = 0
  • EnableHttp2Cleartext = 0
  • Reboot and test. If it restores connectivity, plan how to apply and later revert the change safely.
  • If isolation fails and the machine is non-production: uninstall KB5066835:
  • Run elevated Command Prompt:
  • wusa /uninstall /kb:5066835
  • Reboot and test. If necessary, repeat for sibling KBs identified in your environment.
  • Hold updates on affected machines:
  • Pause Windows Update on affected dev boxes until a vendor fix or known issue rollback is released. Do not blanket-hold production machines unless risk-assessed.
  • Communicate and document:
  • Notify developers and Ops teams of the temporary mitigation and a planned revert once a hotfix or KIR is issued.
  • Keep an audit trail of changes (registry edits, KB uninstall, Defender updates) to simplify reversion.
  • Monitor official channels:
  • Watch the Microsoft KB and Release Health / Q&A threads for an authoritative hotfix or known-issue rollback announcement.

Vendor and Microsoft response: what we know​

Microsoft community engineers engaged directly on Microsoft Q&A threads and acknowledged the correlation between KB5066835 and IIS/localhost failures — providing interim guidance such as regkey workarounds and uninstalls while investigation continued. However, at the time the community’s mitigations solidified, Microsoft’s KB page for KB5066835 did not include a formal “Known issue” entry specifically describing the localhost regression; that left many admins to choose between temporary mitigations or rolling back security updates.
Independent reporting outlets and platform forums corroborated the community timeline and advised caution: the problem frequently reproduced on upgraded systems but sometimes vanished on clean installs of the same build, suggesting the bug interacts with machine state rather than being uniformly present. That nuance matters for how enterprises structure test rings and validate updates.

Why this matters: risks and systemic lessons​

Risk profile​

  • Disabling HTTP/2 or uninstalling cumulative security updates are immediate, practical ways to restore productivity, but both reduce security or performance in different ways. Uninstalling a security LCU increases exposure; disabling HTTP/2 reduces protocol performance and can change application semantics.
  • The incident shows how a kernel-mode regression in a foundational OS component (HTTP.sys) can simultaneously affect a vast swath of developer tooling, CI pipelines and enterprise admin consoles — producing an outsized operational impact disproportionate to the apparent size of the code change.

Testing and validation gaps revealed​

  • Several reports indicate freshly imaged systems did not reproduce the bug while upgraded machines did, implying that validation should include long-lived upgrade paths and not rely solely on clean-slate images.
  • Update test rings should incorporate real-world, third-party workloads (IDEs, vendor management tools, local web services) and not only vanilla platform scenarios.

Process recommendations​

  • Maintain separate update rings for developer endpoints and production systems.
  • Keep a documented rollback and mitigation playbook — including how to deploy temporary registry mitigations and how to uninstall cumulative updates safely.
  • Reduce reliance on kernel-level behaviors in developer tooling where practical (local user-mode servers, containers, Kestrel for .NET dev scenarios).
These operational changes align with the immediate technical mitigation choices and lower the blast radius should future updates touch core networking subsystems.

Critical analysis: strengths, weaknesses and unanswered questions​

Strengths in the community response​

  • Rapid, cross‑platform triage: developers, independent researchers and Microsoft community staff converged quickly on a plausible technical hypothesis and practical mitigations.
  • Multiple independent mitigations gave admins choices: a low-risk Defender update, a reversible registry toggle, and an uninstall path for short windows when necessary. Community documentation and runbooks spread fast, enabling many teams to recover quickly.

Weaknesses in vendor communication and platform testing​

  • Microsoft’s KB did not immediately document the localhost regression in a consolidated manner, complicating enterprise risk decisions and forcing admins to choose between productivity and security.
  • The variable reproduction between upgraded images and clean installs indicates the update testing matrix may not have covered sufficient long-lived, stateful scenarios — a gap most organizations should account for in their own internal validation testing.

Unanswered technical questions (flagged)​

  • The precise low-level change inside HTTP.sys that triggered HTTP/2 negotiation resets has not been published in a formal Microsoft post‑mortem at the time of the incident. Until Microsoft publishes the root-cause and a code-level explanation, any claim about the exact line of code or module is speculative and should be treated with caution. This is an important unverifiable detail at this stage.

Practical recommendations for Windows developers and IT teams​

  • Inventory: identify which developer machines, build agents and servers rely on local IIS/IIS Express or other loopback-bound services.
  • Canary: add long-lived, historically-upgraded images to your update validation ring so you catch upgrade‑path regressions earlier.
  • Short‑term mitigation ladder:
  • Try Defender intelligence update + reboot.
  • If necessary and isolated: apply registry HTTP/2 disable and reboot.
  • As a last resort in non-production: uninstall KB5066835 and pause updates on affected devices.
  • Longer-term: prefer containerized or user‑mode local servers for development (Kestrel, Docker) to reduce dependency on kernel-level subsystems.
  • Communication: keep stakeholders informed of the mitigation’s security trade-offs and a scheduled timeline to re-enable HTTP/2 and reapply vendor KBs after a hotfix or Known Issue Rollback is available.

Conclusion​

The October 2025 KB5066835 episode is a clear example of how a routine cumulative update can trigger deep operational friction when it touches a shared, kernel-mode dependency like HTTP.sys. The immediate fallout was painful for developers and some enterprises: broken localhost flows, disabled debugging, and urgent rollback decisions. The community response — practical mitigations, registry workarounds and vendor advisories — restored many workflows, but the event leaves open important questions about testing, vendor communication and the hidden fragility of long‑lived upgrade paths.
For teams, the lessons are straightforward and actionable: treat developer endpoints differently from production, add long-lived images to your validation rings, document rollback playbooks for rapid response, and reduce unnecessary reliance on kernel-level platform behavior where feasible. Until Microsoft publishes an authoritative post-mortem and a targeted fix (or issues a Known Issue Rollback), employ the least invasive mitigations first, catalog your changes, and plan to revert temporary fixes once a vendor-approved resolution is available.

Source: TechPowerUp Microsoft Breaks Localhost with Windows 11 October Update, Users Forced to Revert
 

Microsoft’s October cumulative update for Windows 11 (KB5066835) has left many developers and admins staring at dead localhost connections: browsers and development tools report ERR_HTTP2_PROTOCOL_ERROR, Visual Studio debugging sessions refuse to attach, and locally hosted IIS and IIS Express sites suddenly stopped responding on loopback addresses after the patch was applied.

Diagram of an HTTP/2 handshake failure in Windows, showing kernel-mode HTTP.sys error and registry edits.Background / Overview​

The problematic package arrived as part of Microsoft’s regular October patch cycle and updated Windows 11 systems to builds identified in community reports as 26100.6899 (24H2) and its sibling 25H2 build. Within hours of rollout, multiple community threads and vendor support channels showed consistent symptoms: HTTP/2 negotiation failures, connection resets to localhost and 127.0.0.1, and failure of IIS‑backed services and development workflows that rely on the OS HTTP stack.
Early triage converged quickly on the operating system’s HTTP stack—HTTP.sys, the kernel-mode HTTP listener—as the likely locus of the regression. That assessment comes from cross-posted observations, Microsoft community responses, and vendor incident reports; however, the exact low-level code change inside HTTP.sys that provoked the behavior has not been published in a formal Microsoft post‑mortem at the time community reports surfaced. Treat the precise internal root cause as community‑derived analysis until Microsoft issues an official technical breakdown.

What broke — symptoms and scope​

Common, reproducible symptoms​

  • Browsers returning ERR_HTTP2_PROTOCOL_ERROR or ERR_CONNECTION_RESET when navigating to [url]http://localhost[/url] or [url]https://localhost[/url].
  • Visual Studio projects using IIS Express fail to start, attach the debugger, or hit breakpoints; developers see exceptions from local HTTP listeners (for example, HttpListenerException).
  • Third‑party desktop and enterprise products that embed a local web server or use loopback bindings (reporting examples in community threads) lose connectivity until the offending KB(s) are removed.

Who is affected​

Reports concentrated on machines upgraded to the October 2025 LCU (KB5066835) and related servicing updates, but reproduction was not strictly universal. Some freshly installed, fully updated images did not reproduce the bug — suggesting the regression interacts with pre‑existing configuration or third‑party components on long‑lived systems rather than being a universal failure for every Windows 11 install. That variability means mitigation may look different across environments.

Where the failure sits technically​

Community triage points to the kernel-mode HTTP listener, HTTP.sys, and specifically how the stack negotiates HTTP/2 and handles TLS for loopback connections. When HTTP.sys mishandles HTTP/2 negotiation or TLS parameters, the connection fails before reaching user-mode servers like IIS or processes that rely on HttpListener, producing the protocol-level resets observed by users. Disabling HTTP/2 at the OS HTTP stack level prevents the problematic negotiation step and often restores connectivity — which is why the registry workaround spread so quickly.

Immediate mitigations and step‑by‑step guidance​

The community produced a short ladder of mitigations, from lowest-risk to most invasive. Each is effective in many cases, but all carry trade‑offs that must be weighed against security and operational posture.

1. Update Microsoft Defender security intelligence and reboot (lowest risk)​

Several reports show that applying the latest Microsoft Defender definition updates and rebooting restored localhost connectivity for some systems. This is a non-invasive, fast first step that’s worth trying before any broader change. It’s safe to run on production devices and should be attempted first.

2. Registry workaround: disable HTTP/2 at OS HTTP stack (stopgap)​

If the Defender update does not fix the issue and you need an immediate remediation for developer machines, the widely circulated registry workaround disables HTTP/2 negotiation at the HTTP.sys level. Use this only on non‑production/dev machines until a vendor patch is available.
  • Run an elevated registry editor or a scripted command to set the following DWORD values to 0 under HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters:
  • EnableHttp2Tls = 0
  • EnableHttp2Cleartext = 0
  • Reboot the machine.
Effect: forces the OS to fall back to HTTP/1.1 for both TLS and cleartext connections on the HTTP stack and, in many reported cases, restores localhost-based services and debugging sessions. Trade-offs: this disables HTTP/2 globally and can reduce performance or change behavior where HTTP/2 is relied upon. Use only as a temporary, controlled mitigation and document the change so you can revert it later.

3. Uninstall the offending KB(s) (more invasive; security impact)​

If the above steps don’t work and the machine is isolated or the need is critical, uninstalling the cumulative update that introduced the regression restores previous behavior for many users.
  • Uninstall via an elevated command prompt:
  • wusa /uninstall /kb:5066835
  • Reboot and test.
  • If still broken on your system, some reports required removing related servicing packages (for example, KB5065789) — test on a non‑critical machine first.
Effect: rollbacks often restore localhost functionality. Risk: uninstalling a cumulative security update changes the device’s security posture and must be treated as a time‑limited mitigation. Coordinate with security teams and plan compensating controls (network segmentation, limited internet exposure) until you can reapply the fix safely. Some users reported uninstall failures or inability to remove certain packages; always validate the uninstall path on a test device first.

4. Application-layer workarounds (longer-term, safer)​

Where possible, bypass kernel-level HTTP.sys dependencies for local development:
  • Use application-level web servers like Kestrel for ASP.NET Core and bind explicitly to 127.0.0.1.
  • Put a dev-only reverse proxy (e.g., local Nginx or a simple TLS-terminating proxy) in front of the service so you avoid HTTP.sys negotiation entirely.
  • Containerize dev workloads (Docker) or use a virtual machine image that you control and can snapshot.
These options reduce reliance on kernel-mode behavior and make your dev stack more predictable across OS patches.

Risks, trade-offs, and why this is a delicate decision​

Security vs. availability​

Uninstalling a cumulative security update returns functionality but re-exposes the host to the vulnerabilities the update addressed. Disabling HTTP/2 reduces attack surface in the short term but also removes protocol improvements and possibly mitigations that rely on newer protocol semantics. Any rollback or protocol toggle must be accompanied by compensating controls and a documented timeline for reapplying updates.

Broad vs. targeted changes​

The registry toggle is blunt: it affects all services that rely on the OS HTTP stack. For individual developers or isolated build agents this may be acceptable; for production servers or mixed-use machines it is not recommended.

Variability in reproduction​

Because some clean installs did not reproduce the issue while long-lived upgrades did, any mitigation plan must allow for per-host troubleshooting. Expect to run diagnostics and document machine state and installed third-party drivers/components when triaging affected hosts.

Technical analysis — the likely fault domain, explained​

HTTP.sys: why a kernel-mode regression is particularly disruptive​

HTTP.sys is the kernel-mode listener Windows uses to accept HTTP connections and route them to user-mode servers like IIS or processes using HttpListener. Because it sits beneath many services, regressions in HTTP.sys ripple widely across IDEs, test harnesses, desktop applications, and management consoles.

HTTP/2 negotiation and TLS interplay​

HTTP/2 negotiation changes the connection startup sequence and adds protocol framing that HTTP.sys must parse and manage. Several community tests suggest the failure is a protocol-level reset during HTTP/2 negotiation or a TLS-related handshake anomaly when HTTP/2 is used over TLS on loopback. When HTTP.sys rejects or resets frames at kernel level, no amount of user-mode retry logic will hide the symptom. Disabling HTTP/2 forces the stack to use HTTP/1.1 and avoids the failing negotiation path, which is why this mitigation succeeds in many cases.

What remains unverified​

The exact line of code or precise semantic change inside HTTP.sys that caused these resets has not been published. Community analysis is thorough and consistent in implicating HTTP.sys and HTTP/2/TLS handling, but that remains an informed hypothesis until Microsoft publishes an official root-cause analysis and patch notes. Flagging this as unverified is critical for technical precision.

Practical playbook for development teams and IT​

  • Inventory: identify developer machines, CI agents, and servers that depend on IIS, IIS Express, or local loopback services. Prioritize recovery by business impact.
  • Canary: stop automatic deployment of KB5066835 to dev rings. Add long-lived, historically-upgraded images to your validation ring to catch upgrade-path regressions.
  • Try the low-risk fix: install the latest Defender security intelligence update and reboot. Log results.
  • If necessary on dev machines: apply the registry HTTP/2-disable on isolated hosts and reboot. Script the rollback and document precisely where the toggle was applied.
  • If a registry toggle is not possible: evaluate application-layer changes (Kestrel, reverse proxy, containers). These are safer for production and long-term.
  • As last resort and only in isolated cases: uninstall KB5066835 on non-production hosts and apply compensating controls while awaiting a vendor hotfix.
Finally, ensure your team keeps a clear rollback playbook and communicates the security trade-offs to stakeholders before applying any mitigation broadly.

Microsoft’s response and what to watch​

At the time community reports peaked, Microsoft community moderators and support engineers were engaged on Q&A channels and acknowledging correlations between the October update and localhost regressions, while the public KB entry for KB5066835 did not initially include a consolidated known‑issue note or a targeted hotfix. Administrators should monitor Microsoft’s Release Health updates and KB pages for an official hotfix or Known Issue Rollback (KIR). Until Microsoft publishes a firm root-cause and patch, community mitigations remain pragmatic but provisional.

Lessons learned — operational takeaways​

  • Treat developer endpoints differently from production. Dev machines are higher‑risk to break from platform hardening changes and deserve a separate update ring.
  • Include long‑lived, historically‑upgraded images in your validation matrix; testing only on clean images misses upgrade-path regressions.
  • Maintain a documented rollback and mitigation playbook that covers registry toggles, uninstall steps, and compensating security controls.
  • Reduce reliance on kernel‑mode platform behaviors for local dev: prefer containers, application servers you control (Kestrel), and explicit 127.0.0.1 bindings in CI/dev workflows.

Conclusion​

A routine cumulative update becoming a developer‑blocking incident underscores the fragility of deep platform subsystems and the real cost of unpredictable regressions. Community triage rapidly produced effective mitigations — from Defender updates to registry toggles and rollbacks — and those mitigations restored workflows for many.
However, none of the immediate fixes are a perfect substitute for a targeted vendor hotfix. Disabling HTTP/2 or uninstalling security updates introduces trade‑offs that teams must manage explicitly. The smartest path is pragmatic: try the least invasive steps first, isolate dev machines, document all changes, and monitor Microsoft’s official channels for a formal patch and technical post‑mortem. Until then, teams that depend on local IIS and kernel‑mode HTTP features should treat this incident as a prompt to harden update testing and reduce brittle dependencies in their developer tooling.

Source: Fudzilla.com Windows 11 update breaks localhost for developers
 

Microsoft’s October cumulative update for Windows 11 (KB5066835) has broken localhost-based workflows for many developers by changing how the OS HTTP stack negotiates HTTP/2 on loopback addresses, producing ERR_HTTP2_PROTOCOL_ERROR and connection resets for IIS, IIS Express and other local HTTP services — a regression traced to HTTP.sys in builds 26100.6899 and 26200.6899 and forcing emergency workarounds, rollbacks and careful risk trade-offs.

Illustration of an ERR_HTTP2_PROTOCOL_ERROR with fallback to HTTP/1.1 on localhost (127.0.0.1).Background / Overview​

The October 14, 2025 cumulative update identified as KB5066835 shipped as Microsoft’s regular Patch Tuesday package for Windows 11 and updated systems to OS builds 26100.6899 (24H2) and 26200.6899 (25H2). The KB notes list security and quality fixes but did not initially document the loopback/localhost regression that began surfacing within hours of rollout.
Reports poured in from developer and operations communities: browsers showing ERR_HTTP2_PROTOCOL_ERROR or ERR_CONNECTION_RESET when navigating to http://localhost or https://localhost; Visual Studio failing to start or attach to IIS/IIS Express sessions; and third‑party desktop products that depend on a local HTTP listener becoming inaccessible. These failures were rapid, highly visible, and cross-platform inside the Windows ecosystem because the Windows kernel HTTP listener (HTTP.sys) is a shared dependency for many server and developer stacks.
Clean installs of Windows 11 24H2 in some community tests did not reproduce the issue, while many upgraded/long-lived systems did — a pattern that points to an interaction between the new update and pre-existing machine state (configurations, third‑party drivers, or component versions) rather than a fully universal binary failure. That variability complicated triage and forced operators into case-by-case assessments.

What broke — technical symptoms and footprint​

Symptoms observed in the wild​

  • Browsers report ERR_HTTP2_PROTOCOL_ERROR or ERR_CONNECTION_RESET when connecting to services on localhost (127.0.0.1 / ::1).
  • Visual Studio projects that use IIS or IIS Express fail to start or attach the debugger; developers see HttpListenerException-type errors and broken hot-reload/hot-restart flows.
  • Vendor applications that embed local web services (for example, build and asset-management tools) reported failed connectivity until the offending updates were removed.
These symptoms appear during protocol negotiation — the moment HTTP/2 and TLS are established — which strongly implicates the OS HTTP stack (HTTP.sys) rather than application-layer bugs for many of the reported failures. Community reproductions consistently show that forcing a non‑HTTP/2 outcome (HTTP/1.1) restores connectivity in most cases, which is a practical clue to the failure domain.

The technical locus: HTTP.sys, HTTP/2 and TLS​

Windows’ HTTP stack uses a kernel-mode listener — HTTP.sys — to accept connections and hand them to user-mode server processes such as IIS, IIS Express, or any app using HttpListener. Changes in how HTTP/2 is negotiated or how TLS parameters are handled inside HTTP.sys can therefore cascade to a large set of applications that depend on loopback connectivity. Community triage and Microsoft community engineers have converged on an HTTP/2/TLS negotiation regression in HTTP.sys as the most plausible root cause, although Microsoft had not published a formal post‑mortem at the time community mitigations circulated. Treat the exact, low-level code-level change as unverified until Microsoft provides a detailed technical breakdown.

How organizations and developers regained service (mitigations)​

When a security update breaks core functionality, practical mitigations fall into three categories: low-risk fixes, OS-level temporary mitigations, and rollback of the LCU. Each option has trade‑offs; follow the ladder from least to most invasive.

1) Try Microsoft Defender / security intelligence updates first (lowest risk)​

Some affected users reported that installing the latest Microsoft Defender security intelligence update and rebooting restored localhost functionality in a subset of cases. This is an easy, low-risk first step to attempt before taking any operating‑system level action, though it is not a guaranteed fix and the causal linkage is community-observed rather than formally explained by Microsoft.

2) Disable HTTP/2 at the OS level (workaround that restores connectivity)​

Many teams found success by forcing the Windows HTTP stack to avoid HTTP/2 negotiation and fall back to HTTP/1.1. This is a reversible registry change suitable for isolated developer machines or short-term triage, but it removes HTTP/2 benefits (multiplexing, header compression, some performance and latency improvements).
  • Registry keys to add (requires Administrator and reboot):
  • Path: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP\Parameters
  • Create DWORD (32-bit) EnableHttp2Tls = 0
  • Create DWORD (32-bit) EnableHttp2Cleartext = 0
  • Reboot the machine.
This registry workaround was documented in community threads and demonstrably restored service widely; use it on isolated/dev machines and document the change so it can be reverted once Microsoft issues an official fix.

3) Roll back the cumulative update (last resort for recovery)​

If mitigations fail and productivity is blocked, some administrators uninstalled the offending KB packages (for example KB5066835, and in a number of cases the earlier KB5065789) and rebooted to restore local services. Use this path only when absolutely necessary and within a controlled window because it removes security and quality fixes.
Typical rollback steps reported by practitioners:
  • From an elevated command prompt:
  • wusa /uninstall /kb:5066835
  • Reboot and test.
  • If necessary, also remove sibling or related KBs (community reports mention KB5065789 and others). Reboot after each uninstall and test between removals.
Important operational note: Microsoft bundles servicing stack updates (SSU) with cumulative updates in the combined package. If you installed a combined SSU+LCU package, wusa /uninstall on the combined package may not work and you may have to remove the LCU via DISM with the package name. Consult Microsoft’s KB guidance for the correct DISM removal procedure — do not attempt mass uninstalls on production servers without tested rollback plans.

Step‑by‑step triage checklist (practical guide)​

  • Inventory: Identify which machines run local IIS, IIS Express, HttpListener-based services, or vendor apps that use loopback. Prioritize developer workstations and test agents.
  • Try low-risk remediation:
  • Install the latest Defender security intelligence definitions and reboot. Document results.
  • If problem persists on non-production/dev machines:
  • Apply the HTTP/2 registry toggle (two DWORDs under HKLM\System\CurrentControlSet\Services\HTTP\Parameters) and reboot. Test developer workflows.
  • If still unresolved and blocking critical operations:
  • Plan a rollback of KB5066835 in a controlled maintenance window. Use wusa /uninstall where possible; if the package is combined with an SSU, use DISM/Remove-Package with the LCU package name. Validate rollback on a snapshot/VM first.
  • Monitor Microsoft Release Health, the KB page for KB5066835, and vendor advisories for targeted hotfixes or Known Issue Rollbacks (KIR). Re-enable HTTP/2 after the vendor fix is published and validated.

Practical trade‑offs and security considerations​

  • Disabling HTTP/2 reduces performance and removes modern protocol features; it is a reasonable short-term triage tactic but not a long-term configuration for production workloads. Document and remove this temporary change once Microsoft publishes a fix.
  • Uninstalling a security cumulative update reintroduces exposure to vulnerabilities patched by the LCU. If rollback is required, implement compensating controls (network isolation, firewalling, monitored maintenance windows) and minimize the rollback window.
  • The variability of the bug (clean installs sometimes unaffected) signals that per-host troubleshooting may be necessary; do not assume a single mitigation will fix every affected machine. Test first.

Why this happened: testing, upgrade-state fragility, and kernel-level risk​

This incident highlights three recurring realities for Windows administrators and developer teams:
  • Kernel-mode components like HTTP.sys are widely shared. A change at that layer has an outsized blast radius because it affects many user-mode servers and internal tools. The fallout is immediate and visible for developers who depend on localhost.
  • Upgrade-path state matters. Long-lived, upgraded systems carry configuration, driver and registry state that clean installs do not, so regressions that interact with that state can surface only on upgraded machines. That makes validation of upgrade paths a crucial step beyond just testing fresh images.
  • Patch release communication and Known Issue Rollbacks are central to enterprise risk management. When a security LCU breaks functionality, the absence of a fast KIR puts admins in a painful trade-off between security posture and operational capability. Robust release-health telemetry and clear vendor communication matter.

Vendor and community signals​

  • Microsoft’s KB for the October 14, 2025 update documents the builds and the improvements shipped in KB5066835, including the fact that SSUs are combined with cumulative packages; the KB also provides the file-information and removal guidance required for careful rollback planning.
  • Microsoft Q&A threads and a Microsoft community engineer acknowledged the correlation between KB5066835 and failing IIS services, providing early confirmation that the update is implicated while community triage continued.
  • Independent outlets and forums — including community posts, Stack Overflow threads locked due to volume, and IT news sites — documented both the symptoms and community workarounds (registry toggle, Defender update, uninstall), which helped practitioners recover quickly.

Recommendations for teams: immediate and mid‑term​

Immediate (next 24–72 hours)​

  • Triage in this order: Defender intelligence update → registry HTTP/2 toggle on isolated dev machines → rollback in a controlled window if required. Record every change.
  • Do not perform mass rollback across production servers without security review. If rollback is necessary, isolate systems and employ temporary network controls.

Mid-term (weeks)​

  • Add long-lived upgrade-path images to your update validation ring. Test patch installations on historically upgraded images, not just fresh imaged systems, to catch stateful regressions.
  • Reduce reliance on kernel-mode behaviors for local development where feasible: prefer user-mode server processes (Kestrel), containers, or local reverse proxies in dev environments to shrink the blast radius of kernel-level changes.

Communication and documentation​

  • Keep developers and CI/CD owners informed of temporary mitigations, registry changes, or rollbacks so local build agents and teammates aren’t surprised. Store mitigation runbooks in your runbook repository.

What remains unverified and why to be cautious​

Community consensus points strongly to an HTTP.sys HTTP/2 negotiation regression introduced or exposed by KB5066835, but the precise low‑level code change inside HTTP.sys (for example, specific TLS post-handshake semantics or specific frame-handling behaviour) had not been published by Microsoft in a code-level post‑mortem at the time these mitigations circulated. Until Microsoft publishes an authoritative technical root cause and a targeted fix or Known Issue Rollback, any claims about exact internal code paths should be treated as informed community analysis, not vendor-confirmed facts.

The broader lesson for Windows operations and dev teams​

Patch management is a continual exercise in risk-vs-productivity trade-offs. When a cumulative update touches a shared, kernel-level interface like HTTP.sys, the operational impact is disproportionately large. This incident is a reminder to:
  • Maintain a tested rollback plan and practice it on snapshots/VMs.
  • Use staged update rings that include historically upgraded images so you catch upgrade-path regressions before wide deployment.
  • Prefer development patterns that reduce dependency on kernel-mode subsystems where practical (containers, Kestrel, reverse proxies).

Conclusion​

The KB5066835 episode exposed a brittle intersection between security hardening, protocol defaults, and long-lived system state: a routine Patch Tuesday rollup caused localhost connectivity to fail in many developer and management scenarios by changing HTTP/2/TLS interactions inside the OS HTTP stack. Community triage produced three practical remediation paths — Defender updates, disabling HTTP/2 via the registry, or uninstalling the offending KB(s) — each with material trade-offs. Teams should apply the least invasive mitigation that restores productivity for the shortest necessary time, institute compensating security controls if rolling back, and monitor Microsoft’s Release Health / KB pages for an authoritative fix and re-enablement guidance. Document every step, revert temporary changes after the fix is applied, and use this incident to strengthen update validation, rollback plans, and local development practices.

Source: Fudzilla.com Windows 11 update breaks localhost for developers
 

Microsoft quietly pushed a fix after reports that the October Windows 11 cumulative update (KB5066835) — and in some cases the related preview/servicing package KB5065789 — broke many IIS‑hosted and localhost web sites by changing HTTP/2/TLS behavior in the OS HTTP stack, leaving developers and some vendors forced to apply emergency mitigations, uninstall updates, or temporarily disable HTTP/2 to restore connectivity.

A glowing Windows logo lights up a dark data center filled with servers and network graphics.Background / Overview​

Microsoft released the October 14, 2025 cumulative update for Windows 11 (KB5066835), which updated consumer and enterprise installs to OS builds reported as 26100.6899 (24H2) and 26200.6899 (25H2). The package bundled a set of security and quality fixes and referenced earlier preview fixes from KB5065789. The update roll‑out quickly produced a high‑visibility regression: services bound to loopback addresses (localhost / 127.0.0.1 / ::1), including IIS and IIS Express, started failing to accept connections or returned protocol errors in browsers and development tools.
This article compiles what is verifiable from official Microsoft materials and independent reporting, analyzes the technical footprint and mitigations, highlights risks for IT and development teams, and offers pragmatic guidance for safe, short‑term recovery and longer‑term patch strategy.

What broke: observed symptoms and operational impact​

Typical, reproducible symptoms​

  • Browsers attempting to reach localhost sites display protocol errors such as ERR_HTTP2_PROTOCOL_ERROR or ERR_CONNECTION_RESET.
  • Visual Studio projects that use IIS Express fail to start, cannot attach the debugger, or throw HttpListener errors during debugging.
  • Third‑party desktop and enterprise products that embed local web servers or rely on loopback HTTP endpoints (for example, some configurations of Autodesk Vault) lost connectivity until updates were removed.

Who reported problems​

  • Developer communities (Stack Overflow threads, GitHub issues, forums) and sysadmin channels were the earliest and most concentrated reporters.
  • Some ISVs and enterprise customers reported production or near‑production outages when local management consoles or inter‑process HTTP bindings stopped working.

Variation and reproducibility​

Not every machine failed. Community testing showed the regression was more likely on long‑lived systems upgraded through the normal Windows Update path than on some clean images; that pattern suggests an interaction between the updated OS HTTP stack and existing machine state, configuration, or third‑party components. That variability complicated triage and forced per‑host diagnosis.

Technical analysis: where the failure likely lives and why it matters​

Short technical summary​

The failure pattern — protocol negotiation resets during local TLS/HTTP/2 handshakes — points to a regression in HTTP.sys, the kernel‑mode HTTP listener in Windows that accepts connections and forwards them to user‑mode servers such as IIS. Because HTTP.sys sits beneath IIS and is shared across user‑mode services that use HttpListener, a kernel‑level regression there has outsized impact across development tooling and server components. Community triage and Microsoft support responses converged on HTTP/2 negotiation and TLS handling on the loopback interface as the most plausible fault domain.

Why HTTP.sys matters for localhost workflows​

  • Shared dependency: IIS, IIS Express, HttpListener‑based apps, and many vendor utilities all depend on the kernel HTTP stack for accepting connections. A kernel‑mode regression cascades widely.
  • Protocol negotiation complexity: HTTP/2 negotiation and TLS handshake semantics are sensitive to timing, header handling, and post‑handshake semantics. A hardened or changed negotiation step at the OS level can break clients that previously tolerated a looser path.
  • Loopback differences: Loopback traffic is commonly treated differently by stacks (cleartext vs TLS, different performance paths), and changes that are benign on external interfaces can unexpectedly affect localhost behavior.

What Microsoft has said (and what remains unverified)​

Microsoft’s update pages for KB5066835 list the build numbers and the improvement scope for the cumulative update, and their preview notes for KB5065789 indicate fixes and improvements that include a resolution for the class of issue at hand. Microsoft community engineers acknowledged the link between KB5066835 and IIS failures in Microsoft Q&A threads and advised mitigations and feedback submissions while investigations proceeded. However, Microsoft did not publish an immediate line‑by‑line code‑level root cause (for example, a precise HTTP.sys change) at the time community mitigations circulated; the detailed internal cause remains the vendor’s to document. Treat low‑level HTTP.sys internals claims as strong, community‑derived analysis until Microsoft publishes a formal post‑mortem.

Confirmed vendor and community signals​

  • Microsoft Support published the KB articles listing the October cumulative update details and referencing build numbers.
  • Microsoft Q&A staff and community responses acknowledged incidents of IIS failing after KB5066835 and recommended mitigations and feedback submission routes.
  • Independent reporting and vendor advisories (The Register, PiunikaWeb, Autodesk forums) documented widespread operational impact and vendor‑level mitigation advice, including rollback guidance and temporary workarounds.
  • Community compilations and triage notes summarized practical mitigations and risk trade‑offs for IT teams.

Practical mitigations: what worked, in order of invasiveness​

Before applying any mitigation broadly, validate on a representative test machine and have a rollback plan.

1. Refresh Microsoft Defender security intelligence and reboot (lowest invasiveness)​

Several users reported that updating Defender definitions (Microsoft Defender Security Intelligence) and rebooting restored localhost connectivity without uninstalling updates. This is a fast, low‑risk first step for affected machines. It should be attempted before more intrusive actions.

2. Disable HTTP/2 at the OS HTTP stack level (registry toggle — mitigates protocol negotiation)​

Disabling HTTP/2 forces the OS to fall back to HTTP/1.1 and bypasses the problematic HTTP/2 negotiation path observed in many reproductions. This is effective as a stopgap but reduces performance and feature parity and should be treated as temporary.
  • Registry path: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP\Parameters
  • Common keys used by community mitigations:
  • EnableHttp2Tls = 0
  • EnableHttp2Cleartext = 0
After setting, reboot. Test thoroughly. This is a blunt but commonly effective workaround reported across multiple independent sources. Do not leave HTTP/2 permanently disabled in production unless explicitly required and approved by security policy.

3. Uninstall KB5066835 (and, where present, KB5065789) — last resort​

Uninstalling the cumulative update restored functionality for many impacted servers and developer machines but reintroduces the security exposures the patch addressed. If you choose uninstall:
  • Only do this on machines where the outage prevents critical operations and you cannot otherwise mitigate.
  • Plan compensating controls (network isolation, alternative patching windows).
  • Use standard tools: wusa /uninstall /kb:5066835 and wusa /uninstall /kb:5065789, then reboot.
  • Pause automatic updates for affected hosts until Microsoft issues a targeted fix or Known Issue Rollback (KIR).

4. For dev teams: move local server responsibilities to user‑mode or containerized hosts​

Where feasible, prefer Kestrel, Docker containers, or user‑mode servers that do not rely on HTTP.sys for development and CI agents. That reduces blast radius from kernel‑mode regressions and makes local development environments more reproducible.

Microsoft’s roll‑out and the stated fix status​

  • The official KB page for KB5066835 confirms the October 14, 2025 release and the affected builds. Microsoft’s notes link to fixes included from prior preview updates.
  • Microsoft’s preview package KB5065789 release notes explicitly stated it “includes important improvements and fixes, including a resolution for this issue” — indicating Microsoft recognized the problem and included a remedial change in that servicing stream. That aligns with vendor comments and community reports that installing the preview or applying Defender intelligence updates restored service for some systems.
  • Microsoft community staff engaged on Microsoft Q&A and advised steps such as reinstalling IIS components where configs may have changed, providing guidance while engineering investigated. However, at the time of initial reporting Microsoft did not publish a full technical post‑mortem explaining the precise HTTP.sys change.
Important verification note: the public KB pages and Microsoft Q&A are the primary authoritative sources for build numbers and the vendor’s remediation statements; independent reporting (The Register, PiunikaWeb) corroborates impact and reproductions. Cross‑reference these vendor materials before applying permanent changes.

Risks, trade‑offs, and critical evaluation​

Strengths of Microsoft’s response (what went right)​

  • Microsoft engaged on public support channels (Microsoft Q&A) and acknowledged user reports, giving administrators a central place to track updates and mitigation status.
  • The preview channel (KB5065789) allowed Microsoft to deliver fixes in a servicing stream and for some teams to test the remedial changes before a broad re‑roll.

Weaknesses and risks (what went wrong or remains risky)​

  • High impact of a kernel‑mode regression: A change to HTTP.sys affected many unrelated apps and developer workflows, creating widespread operational friction. That single point of failure illustrates how kernel‑level hardening or tightening can break long‑standing compatibility assumptions.
  • Patch vs. compatibility trade‑off: Uninstalling a security LCU to restore functionality exposes systems to vulnerabilities unless compensating controls are applied. That forces painful, risk‑weighted decisions for IT teams.
  • Variable reproduction: The bug’s uneven reproduction across clean images versus upgraded systems suggests upgrade‑path testing gaps and underscores the need for long‑lived image validation in enterprise patch rings.

Operational recommendations to manage the risk profile​

  • Treat developer and build agents as special in patch rollouts: maintain canary rings that include long‑lived, production‑like images.
  • Create documented rollback playbooks that list exact commands to uninstall KBs, required reboots, compensating controls, and re‑enable timelines.
  • Use registry mitigations as temporary stopgaps and log all changes to ensure quick reversal after vendor hotfixes.

Step‑by‑step: quick checklist for administrators (ordered, with conservative defaults)​

  • On an affected machine, verify symptoms: attempt curl or browser request to http://localhost and note error codes (ERR_HTTP2_PROTOCOL_ERROR, ERR_CONNECTION_RESET, HttpListener exceptions).
  • Attempt the least invasive fix first: update Microsoft Defender security intelligence, reboot, retest.
  • If the issue persists and the machine is non‑production, test the registry HTTP/2 disable steps on a single host:
  • Set EnableHttp2Tls = 0 and EnableHttp2Cleartext = 0 under HKLM\System\CurrentControlSet\Services\HTTP\Parameters.
  • Reboot and retest.
  • If registry changes restore service, document and script the change (PowerShell/Group Policy) for isolated dev fleets only. Plan to revert after vendor hotfix.
  • If neither step helps and the machine is critically impaired, follow controlled uninstall of KB5066835 (and KB5065789 if present) with a full risk assessment and compensating controls:
  • wusa /uninstall /kb:5066835
  • restart, test; repeat for KB5065789 if necessary.
  • Pause automatic updates on impacted hosts until a vendor KIR or hotfix is available, and track Microsoft Release Health and KB pages for official action.

Longer‑term lessons for teams and ISVs​

  • Introduce long‑lived image testing into update validation rings. Many regressions manifest only when an OS is upgraded across multiple servicing cycles; including long‑lived images in staged rollouts increases the chances of detecting upgrade‑path regressions.
  • Reduce reliance on kernel‑mode shared services where feasible. For dev workflows, prefer containerized or user‑mode local servers to limit the blast radius of OS kernel changes.
  • Prepare rapid rollback playbooks and compensating controls. Maintain documented steps for safe KB uninstallation and reapplication, and ensure teams understand the security trade‑offs before rolling back LCUs.

What to watch next (and verification pointers)​

  • Monitor Microsoft’s official KB pages and the Windows Release Health / Known Issue Rollback announcements for a formal hotfix and technical post‑mortem explaining the root cause and remediation plan. The main KB page for KB5066835 and the KB5065789 preview notes are the authoritative starting points.
  • Track vendor advisories (for example, Autodesk and other ISVs who reported incidents) for product‑specific guidance and compatibility notes.
  • Validate any temporary workarounds (registry toggles, Defender updates) in a test environment before applying broadly; keep these changes documented for reversal once Microsoft publishes an official fix.

Final assessment and conclusion​

The October Windows 11 cumulative update episode underscores a persistent operational reality: kernel‑level hardening or protocol changes can expose long‑standing compatibility assumptions across the Windows ecosystem. Microsoft’s servicing streams responded with a preview fix and guidance on community channels, and practical mitigations (Defender updates, registry‑based HTTP/2 disablement, or uninstalling KBs) restored connectivity in many cases — each with explicit trade‑offs between security and usability.
For administrators and developers the pragmatic path is clear: start with the least invasive fixes, validate registry workarounds in isolated rings, and lean on a documented rollback plan only when absolutely necessary. Above all, treat developer endpoints and build agents as first‑class citizens in your update validation process so that future kernel‑level regressions can be detected and mitigated before they break production or development lifecycles.
This incident is a strong reminder that patching is not only about applying fixes quickly — it’s about balancing security, compatibility, and resilience with repeatable testing, clear rollback plans, and an operational playbook that keeps both productivity and safety aligned.

Source: Neowin Microsoft issues fix as Windows 11 25H2, 24H2 KB5066835, KB5065789 break many IIS websites
 

Microsoft has confirmed that October’s Patch Tuesday cumulative updates for Windows 11 — notably the October 14, 2025 packages that include KB5066835 (and earlier preview releases such as KB5065789) — have caused a regression in the Windows HTTP stack (HTTP.sys) that can break IIS-hosted sites, producing ERR_CONNECTION_RESET and HTTP/2 negotiation failures for localhost and other loopback connections on affected Windows 11 24H2 and 25H2 machines.

Red ERR_CONNECTION_RESET banner above a cracked http.sys chip with IIS icons.Background / Overview​

The October 2025 Patch Tuesday release cycle delivered a set of cumulative updates for Windows 11, including the mandatory security rollups identified as KB5066835 for the 24H2/25H2 builds and earlier preview packages (for example, KB5065789 issued in late September). These packages contain both security fixes and non‑security changes; the October cumulative update also addressed a high‑priority IIS inbox COM object vulnerability (CVE‑2025‑59282).
Within hours and days of that rollout, developers, sysadmins and third‑party vendors began reporting a consistent pattern: requests to http://localhost (and some HTTPS loopback scenarios) began failing with browser errors such as ERR_CONNECTION_RESET or ERR_HTTP2_PROTOCOL_ERROR, Visual Studio debugging against IIS/IIS Express stopped working for many .NET projects, and vendor products that rely on local HTTP listeners (HttpListener or kernel HTTP APIs) stopped responding. Community troubleshooting and Microsoft’s Q&A threads linked these failures to a regression in the kernel HTTP driver, HTTP.sys, specifically during HTTP/2 negotiation or handling on affected builds.
This is not a uniform failure across all machines. Reports show the bug is state‑dependent — it reproduces reliably on some upgraded machines but may not appear on fresh installs of the same build. That pattern suggests interactions with preexisting system state (third‑party drivers, previous update order, or differences in installed components) determine whether the regression manifests.

What’s broken and who is affected​

Symptoms (what admins and developers are seeing)​

  • Browsers navigate to http://localhost and immediately receive ERR_CONNECTION_RESET (connection closed / reset) or similar connection failure messages.
  • HTTPS loopback endpoints may fail with ERR_HTTP2_PROTOCOL_ERROR when HTTP/2 is negotiated, particularly affecting Visual Studio / IIS Express debug sessions for ASP.NET and .NET Core applications.
  • Services that use kernel‑mode HTTP stack endpoints (IIS, HttpListener, services built on URL ACLs) can become unreachable from the same host.
  • Some third‑party vendor apps that embed local web servers for UI or management are failing to respond after the update.
These symptoms have been corroborated across community forums, Microsoft support threads, and independent reporting. Microsoft community engineers and other responders summarized the behavior as an HTTP.sys regression that impacts incoming connections handled by the kernel listener.

Scope and sensitivity​

  • Affected operating system builds include Windows 11 24H2 and 25H2 machines after installing the October cumulative update (KB5066835) and, in some environments, the September preview (KB5065789).
  • The issue is more visible on developer workstations (IIS Express / Visual Studio) and on servers or appliances that depend on loopback-hosted admin services.
  • Fresh installs on identical build numbers sometimes do not reproduce the issue, meaning the bug’s presence depends on prior configuration and installed software — complicating diagnosis in mixed environments.

The technical cause: HTTP.sys, HTTP/2 and the kernel listener​

At the center of this failure is HTTP.sys, Windows’ kernel‑mode HTTP stack. HTTP.sys accepts network requests at the kernel level and hands them to user‑mode consumers such as IIS (w3wp.exe), IIS Express, or any application that registers URL prefixes using HttpListener or the kernel HTTP API. Because HTTP.sys operates below the user‑mode web server, a regression there can make the server appear to be “down” even when the user‑mode process is healthy.
Community analysis and Microsoft‑side responses have pointed to a mishandled HTTP/2 or TLS negotiation path in HTTP.sys introduced (directly or indirectly) by the October updates. That negotiation failure frequently manifests as an immediate connection reset or protocol error from the client perspective. Where HTTP/1.1 remains in use the effect may be less visible — which is why switching to Kestrel or to explicit 127.0.0.1 bindings often mitigates symptoms for some applications.

The hard tradeoff: security fixes vs operational regression​

One of the complicating factors for administrators is that the October cumulative updates also patched a substantive security defect in IIS components — CVE‑2025‑59282 — an inbox COM object race condition/use‑after‑free that could lead to local code execution and, under certain conditions, be leveraged for remote impact. Microsoft released the patch for that CVE as part of the October updates. Removing the update to restore localhost functionality therefore reduces the exposure to that security flaw but reintroduces a security risk. That creates a genuine operational dilemma for many teams.
Security teams and sysadmins must weigh the risk of leaving the update installed (losing local dev/test functionality) against the risk of uninstalling it (exposing hosts to a CVE that has been addressed by the same update). For internet‑facing and high‑value hosts, Microsoft’s guidance is to keep security patches in place and use mitigations rather than uninstalling security fixes where possible.

Microsoft’s response and the Known Issue Rollback (KIR) option​

Microsoft acknowledged the pattern of failures via its support channels and community engineers, and it has made a KIR (Known Issue Rollback) mechanism available to enterprise administrators for scenarios where the regression impacts production or test systems. The KIR system uses an ADMX/ADML policy definition installed from an MSI that places entries into Administrative Templates; domain‑joined or Intune‑managed systems can then apply a Group Policy or ADMX ingestion to disable the offending change without fully uninstalling the cumulative update. Microsoft documents the KIR deployment steps and the intent: roll back the specific problematic change while leaving other update contents in place.
Key points about KIR deployment:
  • Microsoft publishes a KIR policy package when the rollback is necessary and supports enterprise activation through Group Policy or Intune ADMX ingestion.
  • The KIR is a temporary policy change: after Microsoft ships an amended update that reintroduces the fix correctly, the KIR is removed or expires.
  • Enterprises must download the correct MSI/ADMX files for their Windows SKU and install them into their PolicyDefinitions (or Central Store), then configure the corresponding policy under Computer Configuration > Administrative Templates to activate the rollback. Microsoft provides step‑by‑step instructions for both local GP and enterprise GPO deployment.

Practical mitigations and step‑by‑step guidance for IT teams​

The community and Microsoft threads converged on a set of practical mitigations. Each carries trade‑offs and should be evaluated against the organization’s security posture and operational requirements.

Immediate options (ranked by speed of deployment)​

  • Apply the KIR via Group Policy (recommended for enterprises)
  • Download and run the KIR MSI provided by Microsoft that corresponds to the affected KB and OS build.
  • Install the ADMX/ADML in your PolicyDefinitions or Central Store.
  • Create a GPO (or edit local policy): Computer Configuration > Administrative Templates > KB ####### Issue XXX Rollback > Windows 11, version YYMM and set the policy to Disabled (or as Microsoft instructs).
  • Force a GP update (gpupdate /force) and restart affected machines to apply the rollback.
  • Monitor and remove the KIR after Microsoft ships the definitive fix.
  • Disable HTTP/2 at the OS level (works as a short‑term dev/test mitigation)
  • Create the following registry DWORDs under HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters:
  • EnableHttp2Tls = 0
  • EnableHttp2Cleartext = 0
  • Reboot the machine (or restart the HTTP service/IIS) to force changes to take effect.
  • Effect: prevents the problematic HTTP/2 code paths in HTTP.sys; trade‑offs include loss of HTTP/2 improvements and possible side effects for other services. Use only for scoped dev/test machines or as a temporary emergency mitigation.
  • Uninstall the update(s) (least recommended for internet‑facing or critical hosts)
  • Use: wusa /uninstall /kb:5066835 (and, if necessary, /kb:5065789).
  • Reboot and verify local endpoints function.
  • Caveat: uninstalling a security update reintroduces the vulnerability patched by the update (for example, CVE‑2025‑59282). This should be a short‑term action only, paired with compensating controls such as network isolation or restricted access.
  • Workarounds at the application layer
  • For developers: bind services to 127.0.0.1 instead of localhost in app launch profiles; in some scenarios the loopback binding choice affects negotiation behavior and temporarily restores connectivity.
  • Use Kestrel (or another user‑mode server) for local development rather than IIS/IIS Express. Running Kestrel directly avoids kernel HTTP.sys negotiation altogether.
  • Use containerized development (Docker) so the host kernel HTTP stack is not directly involved with in‑container endpoints.
  • Use ngrok or a temporary public callback endpoint for OAuth/EntraID flows that fail on localhost.

Step‑by‑step: enable the KIR (concise)​

  • Identify affected OS builds and the KIR ID in Microsoft’s Release Health / Known Issues list.
  • Download the KIR MSI for the specific KB/issue from Microsoft (match OS SKU).
  • Run the MSI on a management machine; this extracts ADMX/ADML files into C:\Windows\PolicyDefinitions.
  • Create a new GPO targeting the affected devices and enable the KIR activation policy under Administrative Templates.
  • Force GP update on target machines and restart those machines to apply the rollback.
  • Monitor the environment and remove the KIR after Microsoft issues a repaired cumulative update.

Testing and deployment best practices​

  • Do not deploy the KIR or registry mitigations to production without testing in a representative ring (dev/test/prod staging) first. Because the issue is state dependent, test on upgraded systems that mimic production state rather than fresh installs only.
  • For enterprise fleets, use WMI filters or scope by OS build in your GPO to minimize accidental application to non‑affected machines.
  • When uninstalling cumulative updates as a temporary measure, ensure compensating controls are in place (network segmentation, limited remote access, additional EDR monitoring).
  • Document exactly which KBs were removed or which KIR policies applied; maintain an audit trail to simplify roll‑forward when Microsoft releases a permanent fix.

Vendor and Microsoft coordination, and the broader context​

Microsoft’s release model includes safeguards and staged rollouts to catch compatibility issues, and Microsoft will issue KIRs for non‑security regressions when they materially impact customers. The KIR mechanism is well established; Microsoft’s official guidance for deploying KIR via Group Policy and Intune ADMX ingestion is procedural and intended for enterprise IT teams.
Separately, earlier in 2025 Microsoft removed a separate upgrade safeguard for Windows 11 24H2 devices after a third‑party audio driver (Dirac middleware) incompatibility was resolved by the vendor and redistributed. That example shows how Microsoft uses holds and safeguard checks to prevent incompatible devices from receiving feature updates — and how those holds can be lifted once the third party issues a corrected driver. That precedent is useful for understanding Microsoft’s approach to dealing with compatibility‑related rollout blocks and the interplay between vendor fixes and Microsoft’s safeguards.

Risks and trade‑offs — a critical analysis​

  • Operational risk vs security risk: The October updates patched a meaningful IIS vulnerability (CVE‑2025‑59282). Rolling back the update or disabling parts of the patching surface will reintroduce vulnerability exposure. Any mitigation that involves removing the update must be accompanied by compensating security controls.
  • State sensitivity complicates enterprise response: Because fresh installs sometimes do not reproduce the issue, identifying which machines are vulnerable requires active testing on upgraded images that mimic production state. A naive blanket rollback across an enterprise risks leaving many machines unnecessarily exposed.
  • Mitigation side effects: Disabling HTTP/2 or altering registry keys is a blunt instrument. It may affect performance, change TLS negotiation semantics, and alter behavior for other services or third‑party software that rely on modern HTTP features.
  • Communication and developer impact: This regression disproportionately affects developer productivity (local debugging, CI agents, OAuth redirect flows relying on loopback URIs). Organizations must prioritize developer workflows and provide short‑term alternatives (Kestrel, containers, public callbacks) to avoid blocking deliverables.
  • Monitoring and detection: There’s potential for production services to misbehave silently if an internal dependency relies on HTTP.sys. Ensure monitoring covers not only external availability but also internal loopback and localhost service checks for systems that rely on those interfaces.
Where claims or details remain ambiguous (for example, the exact branching logic inside HTTP.sys that caused the regression), administrators should treat the public reporting as actionable correlation rather than a full root‑cause forensic report; Microsoft’s formal release notes and any forthcoming hotfix should be treated as the authoritative resolution when published.

Recommendations — a clear playbook for the next 72 hours​

  • Prioritize public / internet‑facing servers for security: Keep them patched for CVE mitigation (do not uninstall on edge hosts).
  • Isolate affected developer/test hosts and apply KIR or the registry HTTP/2 disablement only in scoped rings until a hotfix ships.
  • Apply the KIR via Group Policy or Intune for enterprise-managed machines that require immediate functional restoration — follow Microsoft’s documented procedure and target only affected build numbers.
  • For dev teams, convert local debugging to Kestrel or 127.0.0.1 bindings and containerized workflows where feasible to minimize use of the kernel HTTP stack.
  • Monitor Microsoft’s Release Health and the KB5066835 KB page for the official hotfix and for removal of the KIR instruction; plan to reverse the rollback as soon as the corrected update is shipped and validated.

Conclusion​

The October 2025 Patch Tuesday rollout fixed an important IIS vulnerability but introduced a consequential regression in the Windows kernel HTTP stack that can break local and inbound IIS connections on Windows 11 24H2 and 25H2 systems. Microsoft has acknowledged the pattern, provided enterprise‑grade rollback tooling via Known Issue Rollback, and community responders have identified practical short‑term mitigations including KIR, temporary HTTP/2 disablement, and application‑level workarounds. Each option requires careful risk assessment: keeping the patch maintains security posture against CVE‑2025‑59282, while rollback or registry changes restore developer productivity at the cost of reintroducing risk or losing HTTP/2 capability. Administrators should follow a staged response: test representative systems, apply KIR to affected rings if necessary, implement short‑term app‑level workarounds, and reverse the temporary measures as soon as Microsoft publishes a corrected update.


Source: Windows Report Windows 11 24H2 and 25H2 Updates Break IIS Websites After Patch Tuesday
 

The October cumulative updates for Windows 11 produced a high-impact, widely reported regression that broke many localhost-based HTTP/2 connections on upgraded systems — leaving developers unable to debug IIS/IIS Express sites, blocking desktop apps that rely on local loopback services, and forcing administrators to choose between temporary mitigations and rolling back a security update. Practical workarounds exist, but each carries trade-offs; this feature explains what happened, who was affected, how to triage and remediate safely, and the operational lessons teams should take from the incident.

Neon blue security setup showing 127.0.0.1, HTTP/2 alerts, and a shield on the monitor.Background / Overview​

Microsoft shipped the October 14, 2025 cumulative update for Windows 11, identified as KB5066835 (with related preview servicing packages such as KB5065789 appearing in September), as part of the regular Patch Tuesday roll‑out for Windows 11 24H2 and 25H2 builds. Within hours of broad deployment, developers, sysadmins and a number of commercial vendors reported that connections to localhost (127.0.0.1 / ::1) that used HTTP/2 began failing with protocol-level errors such as ERR_CONNECTION_RESET and ERR_HTTP2_PROTOCOL_ERROR.
The practical consequence was immediate: tools and applications that assume “the machine can talk to itself” — from Visual Studio debugging and IIS/IIS Express sites to vendor desktop agents like Duo Desktop — were unable to complete requests to local loopback endpoints. The pattern of failures, community triage and Microsoft community responses pointed to a regression in the OS HTTP stack (HTTP.sys) related to HTTP/2 negotiation and TLS handling on loopback interfaces. That is the working technical hypothesis below, albeit one that Microsoft needed to confirm in detail.

What broke: symptoms and technical footprint​

How the failure presented​

  • Browsers navigating to locally hosted sites returned ERR_HTTP2_PROTOCOL_ERROR or ERR_CONNECTION_RESET even when the web server process appeared healthy.
  • Visual Studio projects that use IIS or IIS Express failed to start, attach the debugger, or complete debug sessions; developers saw HttpListener-related exceptions or immediate connection resets.
  • Third‑party desktop applications that embed a local web server for status, authentication or management — notably Duo Desktop in enterprise MFA flows — were unable to reach or authenticate with their local backends, producing login failures and degraded functionality.

Root domain: HTTP.sys / HTTP/2 / TLS negotiation​

Community triage and Microsoft Q&A responses converged on the kernel-mode HTTP listener — HTTP.sys — as the most likely locus of the regression. In practice the system was failing during HTTP/2 negotiation or TLS setup for loopback connections, with the kernel listener apparently terminating or resetting sessions before user-mode processes received any data. The result was a protocol-level reset visible to clients but opaque to the application server. Multiple independent threads and vendor reports reproduced the same symptom set and linked it to the OS HTTP stack.
Important caveat: the precise low-level code change inside HTTP.sys (for example, a state machine bug, header parsing change, or TLS post-handshake handling) was not published by Microsoft at the time of the initial community reports. Treat the HTTP.sys conclusion as strong, community-convergent analysis pending a formal Microsoft post-mortem or targeted hotfix.

Who was affected and why the impact was broad​

This regression disproportionately impacted:
  • Developer workstations that use Windows-hosted IIS/IIS Express for local development and debugging.
  • Build agents or CI runners that rely on loopback-hosted services.
  • Desktop and security products that perform local device checks over HTTP/HTTPS to 127.0.0.1, including some enterprise MFA and endpoint verification clients.
Why the severity? HTTP.sys lives in kernel mode and acts as shared plumbing for any process that registers URL prefixes at the OS level. A failure in that shared layer therefore cascades to any dependent user-mode service — magnifying the effect of a single regression across many seemingly unrelated applications. Additionally, community reports indicated the bug reproduced more readily on upgraded machines than on fresh installs of the same build, suggesting interactions with long-lived system state, third‑party drivers or prior configuration.

Verified mitigations: ladder, steps and trade‑offs​

The community and several outlets converged on a short ladder of mitigations. Each step is progressively more invasive; follow the sequence and choose the least disruptive option that restores necessary functionality.

1. Update Microsoft Defender security intelligence (lowest risk)​

Several affected users reported that applying the latest Microsoft Defender Security Intelligence update and rebooting restored localhost connectivity on some machines. This is a non‑destructive first step and should be attempted before any system-level changes. The mechanism is unclear and this is not universally effective, but it is a safe, low-cost attempt.
Action (try first):
  • Open Windows Security → Virus & threat protection.
  • Under Virus & threat protection updates click Check for updates.
  • Reboot the machine and re-test localhost-based services.

2. Disable HTTP/2 at the OS HTTP stack (temporary, reversible)​

Disabling HTTP/2 in the OS HTTP stack forces the system to fall back to HTTP/1.1 and bypass the problematic HTTP/2 negotiation path. This has proven to restore local connectivity for many users and is the most commonly circulated mitigation when Defender updates fail. It is temporary and should be used only in controlled/dev environments because it disables HTTP/2 globally for all HTTP.sys consumers.
Registry keys to set (Admin + reboot):
  • Path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HTTP\Parameters
  • Create (DWORD 32-bit) EnableHttp2Tls = 0
  • Create (DWORD 32-bit) EnableHttp2Cleartext = 0
PowerShell/Command example (run elevated):
  • reg add "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" /v EnableHttp2Tls /t REG_DWORD /d 0 /f
  • reg add "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" /v EnableHttp2Cleartext /t REG_DWORD /d 0 /f
  • Reboot.
Trade‑offs:
  • Pros: Restores localhost connectivity without uninstalling security updates.
  • Cons: Disables HTTP/2 for all HTTP.sys-based services (reduced performance and feature set), affects other apps that relied on HTTP/2 improvements, and is a blunt, system-wide change that should be reversed when Microsoft releases a fix.

3. Uninstall KB5066835 (and KB5065789 if present) — last resort​

If the above mitigations fail and critical workflows remain blocked, many administrators found that uninstalling the offending cumulative update(s) restored loopback behavior. This is effective but re-exposes devices to the security fixes that the update provided and may be complex if the package included a servicing stack update (SSU).
Commands (elevated Command Prompt):
  • wusa /uninstall /kb:5066835
  • Reboot and test.
  • If problems persist, consider removing the earlier preview KB: wusa /uninstall /kb:5065789 and reboot.
Important warnings:
  • Combined LCU+SSU packages can complicate rollback semantics; some systems may not be able to fully remove the SSU component using wusa. Use DISM /online /get-packages to identify which packages are installed and follow Microsoft guidance for package removal in environments where SSU is included. Test the uninstall on non-critical machines first and coordinate with security teams.

4. Application-level and long‑term mitigations​

When possible, prefer application-level workarounds that reduce dependency on kernel HTTP.sys:
  • Use Kestrel (ASP.NET Core) or a user-mode web server during development.
  • Containerize local services (Docker) or use a VM for dev hosts to isolate patch effects.
  • Move TLS termination into a process you control (reverse proxy) to bypass kernel negotiation.
These approaches require developer time but are safer long term because they avoid reliance on kernel-mode subsystems for local development.

Step-by-step triage checklist (recommended)​

  • Confirm the symptom: reproduce the ERR_HTTP2_PROTOCOL_ERROR or ERR_CONNECTION_RESET when accessing the localhost endpoint. Note whether the service process logs any incoming connection.
  • Attempt the low-risk step: update Microsoft Defender intelligence, reboot, and retest. Document whether the update helped.
  • If unsuccessful, test the registry mitigation on an isolated developer machine (not production): add EnableHttp2Tls = 0 and EnableHttp2Cleartext = 0 under HTTP\Parameters and reboot. Retest services.
  • If the registry change restores functionality, plan reversal steps and schedule a maintenance window to remove the workaround once Microsoft issues a remediation. Capture system state and logs for future analysis.
  • If the workaround fails and the service outage is critical, test uninstalling KB5066835 on a non-production host, then escalate to production only after risk assessment and compensating controls are in place. Coordinate with security to mitigate the temporary exposure window.

Vendor impact and notable examples​

  • Duo Desktop: Duo issued guidance noting the Duo Prompt could fail to reach Duo Desktop after the Windows updates, potentially preventing authentication or limiting functionality in flows that rely on local device checks (Trusted Endpoints, Duo Desktop policies, Duo Passport, Verified Duo Push). This was widely cited by industry outlets and echoed in enterprise incident threads.
  • Visual Studio / IIS Express: Developers reported being unable to start or attach the debugger to IIS-hosted projects, and CI systems that rely on IIS-hosted endpoints were affected until mitigations were applied. Community answers and Stack Overflow threads documented rollback sequences that restored developer workflows.
  • Other vendors: Reports appeared across vendor forums and community channels that products embedding local HTTP endpoints (for telemetry, licensing, or local UIs) were impacted; some vendors published advisories recommending rollback or temporary workarounds for affected customers.

Why a patch like this can be so disruptive​

There are three structural reasons this single update caused disproportionate disruption:
  • Shared kernel plumbing: HTTP.sys is a central kernel-mode service used by many stacks. A regression there affects a broad surface area.
  • Upgrade‑path variability: fresh installs sometimes did not reproduce the regression; historically upgraded systems did, implying stateful interactions with driver order, prior updates, or third-party installed components. That makes pre-deployment validation harder.
  • Combined packages: LCU+SSU bundling complicates rollback semantics, increasing the friction and risk of uninstalling cumulative updates for recovery.
These structural factors argue for staged rollouts, pilot rings that include historically upgraded images, and robust rollback playbooks for critical developer and build infrastructure.

Risks and practical considerations​

  • Security exposure: Uninstalling a security update should be a last resort. If you roll back KB5066835, plan compensating controls (network isolation, host hardening, limited exposure) and a re‑patch schedule once Microsoft issues a targeted fix.
  • Performance and feature loss: Disabling HTTP/2 reduces performance and removes features clients may depend on. Do not leave the registry workaround in place longer than necessary. Track which services are affected by HTTP/2 being off.
  • Operational complexity: Removing combined LCU+SSU packages can be non-trivial; test your rollback procedure, ensure backups, and validate post-rollback behavior across your fleet. Use DISM to inspect installed packages if wusa uninstall fails.
  • Incomplete or variable fixes: Some published mitigations (Defender updates) worked for subsets of users but not universally. Expect per-host troubleshooting and document every change for reversal.

Recommendations for teams and developers​

  • Immediate: Apply the non-invasive mitigations first — Defender intelligence updates and reboots. Test the registry HTTP/2 toggle only on isolated developer machines and not indiscriminately in production. Document and automate both change and rollback.
  • Short-term: If multiple developers are blocked, consider isolating build/dev hosts from automatic patching or using VM/containerized developer images while Microsoft ships a fix. Containerization or Kestrel-based development servers are resilient alternatives to host-bound IIS.
  • Long-term: Add historically-upgraded images to validation rings so upgrade-path regressions surface before wide rollout; maintain tested rollback procedures for combined servicing packages; and prefer development topologies that minimize reliance on kernel-mode subsystems when feasible.
  • Communication: Coordinate with security, operations and development teams before rolling back an LCU. Communicate the mitigation timeline and reversal plan to affected stakeholders. Capture forensic logs (Event Viewer, System and HTTP.sys traces) prior to undoing changes to aid post‑mortem analysis.

What remains unverified and what to watch for​

  • Microsoft post‑mortem: While community analysis strongly implicates HTTP.sys and HTTP/2/TLS negotiation, the exact line-by-line root cause awaited a formal Microsoft technical breakdown at the time of initial reporting. Until Microsoft publishes a full post‑mortem or targeted hotfix, the low‑level internals remain community-derived analysis and should be treated as such.
  • Scope on server SKUs: The initial wave of reports focused on Windows 11 24H2/25H2 developer and desktop hosts; administrators should verify behavior across Windows Server SKUs in their own environment and follow vendor guidance for server platforms before making broad changes. Community threads and vendor reports indicated variability across SKUs and builds.
  • Defender update mechanism: Several users reported Defender updates fixed the problem while others did not. The underlying mechanism by which a definitions update would change HTTP.sys/loopback behavior is unclear and unconfirmed; treat Defender updates as a safe, low-risk attempt, not an authoritative root-cause fix. Flag this as partially verified and watch for vendor confirmation.

Operational takeaways​

  • Treat developer endpoints differently from production: put dev boxes and build agents in a pilot ring or delayed patch group.
  • Keep rollback playbooks and snapshots ready for critical infrastructure. Practice removal and reinstallation on test images to uncover uninstall edge cases (SSU complications).
  • Prefer user-mode development servers or containerized workflows to reduce blast radius from kernel-level regressions.
  • Capture logs and system state before reversing updates for forensic value and to accelerate vendor support.

Conclusion​

The October 2025 KB cycle produced a regression that underlined an unwelcome truth for Windows operations and development teams: when an update touches shared kernel-mode services like HTTP.sys, even a routine security-and-quality rollup can cascade into widespread disruptions. Community triage produced a pragmatic ladder of mitigations — Defender signature updates, a reversible registry toggle to disable HTTP/2 at the OS level, and uninstalling the offending KBs as a last resort — each restoring functionality in many cases but imposing real trade-offs for security, performance, or manageability.
For administrators and developers, the practical path is clear: try the least invasive fixes first, test the HTTP/2 registry workaround only in isolated environments, document every change, and prepare to revert temporary mitigations once Microsoft issues a targeted fix and a formal rollback path. Beyond that immediate response, teams should use the incident to strengthen patch validation, maintain robust rollback playbooks for combined servicing packages, and architect development environments that reduce dependency on kernel-mode networking where practical. The event is a reminder that patch management is risk management — and that resilient processes matter as much as the code they deliver.

Source: Red Hot Cyber Problems with localhost on Windows 11 after October updates
 

Back
Top