A wide-ranging October 2025 cumulative update for Windows 11 (KB5066835), and at least one related preview package, has broken many local IIS-hosted sites and developer workflows — causing ERR_CONNECTION_RESET, ERR_HTTP2_PROTOCOL_ERROR and outright failure of localhost-based services for developers, sysadmins and some commercial applications; practical workarounds are available, but each carries trade-offs that teams must weigh carefully.
Microsoft’s October 2025 cumulative update (KB5066835) landed in the normal patch cadence but quickly attracted reports that local web services hosted with IIS and IIS Express stopped responding on loopback addresses. Multiple community threads and Microsoft’s own support channels show the problem affects Windows 11 24H2 and 25H2 builds and often reproduces as HTTP/2 negotiation failures or connection resets when accessing http://localhost or https://localhost.
The issue surfaced in developer workflows (Visual Studio + IIS Express), in test environments, and in productionized desktop-server applications that rely on local IIS for management or inter-process communication. At least one major vendor — Autodesk — publicly acknowledged that Vault connectivity was impacted by the October updates and recommended rollback where necessary.
Community troubleshooting coalesced quickly: Microsoft engineers and independent responders pointed to changes in HTTP/2 and TLS handling introduced by the updates as the likely root of the regressions. Multiple practical mitigations emerged almost immediately: update Microsoft Defender security intelligence, toggle HTTP/2 at the OS HTTP stack level via registry keys, or uninstall the offending KBs and pause updates until a fix ships. Each option has pros and cons; this article explains them and gives step‑by‑step guidance for safely testing and applying mitigations.
Caveat: while HTTP/2 negotiation is the dominant hypothesis and produces consistent reproductions, not every affected machine shows identical failure modes — some systems required removal of multiple KBs (KB5065789 alongside KB5066835) to regain functionality, and Defender definition updates reportedly fixed others. That variability means the underlying regression can interact with local configuration, installed security products, and existing IIS bindings. Treat the root cause as a compatibility regression with several observable failure modes rather than a single deterministic bug.
Steps:
Registry keys to set:
Options:
Commands (elevated Command Prompt):
Flag: Until Microsoft releases an official hotfix or consolidated guidance, some technical assertions about the exact low-level code change that triggered the regression remain community-derived. Treat those as informed analysis rather than a definitive vendor root-cause statement.
This incident reinforces a perennial truth for IT operations and developer tooling: updates that harden protocol behavior (HTTP/2, TLS defaults) can surface long‑standing compatibility assumptions in middleware and tooling. The immediate path for most teams is pragmatic: try the Defender definition update first, test the HTTP/2 registry toggle in an isolated environment, and only resort to KB uninstall when necessary — with a well-documented rollback and compensating controls in place. Monitor Microsoft’s official channels closely for an authoritative fix and plan to reverse temporary mitigations once the vendor patch arrives.
If affected systems are critical to production, coordinate changes with security and application teams before mitigation; for developers, document any binding or configuration changes in project repositories so CI and teammates are not surprised. The community has produced reproducible workarounds that restore local web hosting quickly, but each choice carries measurable trade-offs that must be managed.
Source: PiunikaWeb Latest Windows 11 update kills localhost IIS — here are the workarounds
Background
Microsoft’s October 2025 cumulative update (KB5066835) landed in the normal patch cadence but quickly attracted reports that local web services hosted with IIS and IIS Express stopped responding on loopback addresses. Multiple community threads and Microsoft’s own support channels show the problem affects Windows 11 24H2 and 25H2 builds and often reproduces as HTTP/2 negotiation failures or connection resets when accessing http://localhost or https://localhost. The issue surfaced in developer workflows (Visual Studio + IIS Express), in test environments, and in productionized desktop-server applications that rely on local IIS for management or inter-process communication. At least one major vendor — Autodesk — publicly acknowledged that Vault connectivity was impacted by the October updates and recommended rollback where necessary.
Community troubleshooting coalesced quickly: Microsoft engineers and independent responders pointed to changes in HTTP/2 and TLS handling introduced by the updates as the likely root of the regressions. Multiple practical mitigations emerged almost immediately: update Microsoft Defender security intelligence, toggle HTTP/2 at the OS HTTP stack level via registry keys, or uninstall the offending KBs and pause updates until a fix ships. Each option has pros and cons; this article explains them and gives step‑by‑step guidance for safely testing and applying mitigations.
What’s actually failing — technical overview
Symptoms observed in the field
- Browsers report ERR_CONNECTION_RESET or ERR_HTTP2_PROTOCOL_ERROR when hitting localhost URLs served by IIS/IIS Express. Requests fail during TLS/HTTP negotiation for many stacks.
- Visual Studio projects that rely on IIS Express fail to start for debugging — developers see exceptions like HttpListenerException: 50 (“The request is not supported”) when a local HttpListener or IIS‑bound service is used.
- Some enterprise products (for example, Autodesk Vault) saw Vault Client-to-Server connections fail until the updates were removed. Vendor forums and pinned community posts confirm widespread operational impact.
Likely technical cause (current consensus and caveats)
Several experts and Microsoft staff pointed to an HTTP/2/TLS negotiation regression introduced or exposed by the updated HTTP stack and related components in KB5066835. The update appears to change default protocol behavior in a way that breaks certain local loopback TLS/HTTP/2 flows that IIS and IIS Express previously tolerated. There is also community analysis that traces related compatibility issues back to TLS 1.3 and post‑handshake client-auth semantics (a related but not identical interoperability area). The exact, single-line root cause remains Microsoft’s responsibility to document formally; community triangulation strongly implicates HTTP/2 negotiation behavior introduced or hardened by the patch.Caveat: while HTTP/2 negotiation is the dominant hypothesis and produces consistent reproductions, not every affected machine shows identical failure modes — some systems required removal of multiple KBs (KB5065789 alongside KB5066835) to regain functionality, and Defender definition updates reportedly fixed others. That variability means the underlying regression can interact with local configuration, installed security products, and existing IIS bindings. Treat the root cause as a compatibility regression with several observable failure modes rather than a single deterministic bug.
Quick assessment: how to decide what to do
Before applying any of the mitigations below, inventory and assess impact:- Identify which hosts rely on local IIS/IIS Express (developer workstations, build/CI agents, servers hosting management UIs).
- Determine whether the service in question uses HTTP/2 by default (modern clients/servers often prefer it).
- Catalog installed security agents and device management policies (some EDR and antivirus hooks can change TLS/HTTP behavior).
- Ensure rollback options exist: recovery image, restore point, or documented uninstall procedures for the KBs.
Practical mitigations and step‑by‑step instructions
The community has converged on a short list of practical mitigations. These are ordered from least disruptive to most disruptive.1) First try: update Microsoft Defender’s security intelligence definitions
Why: Several administrators reported that installing the latest Microsoft Defender Security Intelligence update restored IIS behavior on affected machines where uninstalling the KBs was not an option. This is a low-risk, quick step to try first.Steps:
- Open Microsoft Defender (or download Security Intelligence updates manually from Microsoft’s Defender update page).
- Apply the latest security intelligence package and restart the machine.
- Test localhost/IIS behavior.
- This is an anecdotal but repeatedly reported fix; it should be tried first on any affected workstation because it’s reversible and non-invasive.
- If it resolves the issue, follow up by monitoring Windows Update and Defender definition rollouts for related changes.
2) Temporary mitigation: disable HTTP/2 in the Windows HTTP stack (test first)
Why: Disabling HTTP/2 forces the OS and IIS to fall back to HTTP/1.1 for loopback and other HTTP traffic, avoiding the broken HTTP/2 negotiation path many reports point to. This is a mitigation — it reduces the surface area of the regression without uninstalling security updates.Registry keys to set:
- Path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HTTP\Parameters
- Values (DWORD, 32-bit):
- EnableHttp2Tls = 0
- EnableHttp2Cleartext = 0
- Run regedit as Administrator.
- Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HTTP\Parameters.
- Create two new DWORD (32-bit) values named EnableHttp2Tls and EnableHttp2Cleartext, set both to 0.
- Reboot the computer.
- Test your local site.
- Open an elevated Command Prompt and run:
- reg add "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" /v EnableHttp2Tls /t REG_DWORD /d 0 /f
- reg add "HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" /v EnableHttp2Cleartext /t REG_DWORD /d 0 /f
- Reboot and test.
- This turns off HTTP/2 at the OS HTTP.sys level; it affects all HTTP.sys consumers on the machine, not only IIS. Test carefully in environments where other services depend on HTTP/2 performance or semantics.
- Reversal: set the DWORD values to 1 or delete them and reboot.
3) IIS-level tweaks and binding edits
Why: In some cases disabling HTTP/2 per site or re-creating bindings to explicitly request client certs (for mTLS scenarios) resolves compatibility for targeted services without changing machine-wide settings. This is more surgical but needs administrative rights and careful testing.Options:
- In IIS Manager, for the site binding, disable HTTP/2 if that checkbox is exposed by your IIS version.
- Recreate HTTPS bindings with explicit client-cert negotiation if the app uses client certificates — use netsh http commands and the clientcertnegotiation parameter where supported.
- For IIS Express, adjust applicationhost.config to remove client-cert requirements for local testing, or move TLS termination to a controllable reverse proxy (Kestrel, Nginx) in dev/CI environments.
- Reconfiguring bindings can be overwritten by Visual Studio or deployment tooling; automate or document the change in your dev environment scripts.
- Removing client-cert enforcement for dev is acceptable with strong gating and must not be merged into production configuration.
4) Uninstall the KB(s) as a last resort (and pause updates)
Why: Rolling back KB5066835 — and, in some reports, KB5065789 — reliably restores functionality where the other mitigations fail. This is disruptive and potentially lowers the machine’s security posture, so treat it as a controlled, temporary measure only.Commands (elevated Command Prompt):
- wusa /uninstall /kb:5066835
- Restart.
- If the problem persists, also run: wusa /uninstall /kb:5065789
- Restart and test.
- Test rollback on an isolated machine first.
- If you roll back patches in a managed estate, update change-control and security teams and apply compensating controls (network segmentation, WAF rules) as needed.
- Pause automatic updates via Windows Update policies until Microsoft issues a fix — but do not leave systems unpatched indefinitely.
- Some admins reported difficulty uninstalling certain updates (errors from wusa). If uninstall fails, consider in-place repair or a system image rollback path. Document your rollback options ahead of time.
Risk analysis — security, stability and operational cost
- Security trade-off: Uninstalling security patches increases exposure to vulnerabilities the KB intended to remediate. If rollback is necessary, limit exposure (air-gap for dev machines, host-only environments) and maintain compensating controls until a vendor fix is available.
- Operational risk: Machine-wide HTTP/2 disablement can negatively affect performance and interoperability with services that rely on HTTP/2 features. For larger organizations, machine-level changes must be tested in CI and staging before rollout.
- Reproducibility variability: Some systems required removal of multiple KBs; others fixed with a Defender update. This indicates the regression interacts with local state (third‑party security agents, specific binding configs, or other installed updates). Expect per-host variability and plan a triage runbook.
- Vendor impact: Commercial products that embed IIS or rely on Windows’ HTTP stack (Autodesk Vault is a confirmed example) may fail for end users, creating support tickets and downtime. Vendor advisories are already recommending rollback until Microsoft provides a fix, which increases pressure on IT teams to coordinate patch policies.
Testing checklist (recommended sequence for a single affected machine)
- Reproduce the failure and collect diagnostics:
- Browser error details, IIS logs, Windows Event Viewer entries, and any exception traces from apps.
- Install the latest Microsoft Defender Security Intelligence and reboot. Test localhost again.
- If still failing, apply the HTTP/2 registry toggle on an isolated machine and reboot; test.
- If that resolves the issue, evaluate whether to apply the registry change broadly, or instead reconfigure per-site bindings where possible.
- If mitigation fails and the host is critical: plan a controlled uninstall of KB5066835 (and KB5065789 if required), reboot, and verify. Log every step and maintain recovery points.
Enterprise rollout guidance
- Pilot first: Test mitigations on a small set of representative workstations, build agents and servers. Measure functional success and side effects.
- Communication: Inform developers and helpdesk staff that a workaround or rollback is being evaluated; provide a clear escalation path.
- Automation: If registry toggles are adopted, deploy via Group Policy Preferences, Intune, or a management automation tool; include a reversal runbook.
- Monitoring: Add an alert for failed connections to management services or CI test runners that use localhost to detect regressions quickly.
- Vendor coordination: Track vendor advisories (for products like Autodesk Vault) and coordinate fix timelines with application owners.
What Microsoft has said (and what remains unresolved)
Microsoft support staff and Microsoft Q&A community posts acknowledged the correlation between KB5066835 and the IIS/localhost regressions and recommended the mitigations described above while engineers investigate. The company’s external staff responses and community threads are consistent: the update introduced protocol-level behavior changes that break some local HTTP/2/TLS patterns, and Microsoft engineers are working on a remediation path. A formal, consolidated Microsoft KB-level explanation and hotfix timeline had not been published at the time reports first appeared; follow Microsoft Update channels for an official patch.Flag: Until Microsoft releases an official hotfix or consolidated guidance, some technical assertions about the exact low-level code change that triggered the regression remain community-derived. Treat those as informed analysis rather than a definitive vendor root-cause statement.
Short checklist for developers (condensed)
- Try Defender definition update and reboot (fast, low-risk).
- If still broken, test the registry HTTP/2 disable on an isolated machine: set EnableHttp2Tls=0 and EnableHttp2Cleartext=0 under HKLM\SYSTEM\CurrentControlSet\Services\HTTP\Parameters and reboot.
- Consider running Kestrel or a reverse-proxy as a dev-only TLS termination until the issue is fixed. This bypasses IIS’s HTTP.sys behavior.
- Only uninstall the KB(s) if you have a rollback plan and a short maintenance window; pause Windows Updates for affected machines after rollback.
Final assessment — strengths, risks and the takeaway
Strengths of the available mitigations:- A practical, low-risk first step exists (Defender update) that resolved the problem for many users.
- An OS-level mitigation (disable HTTP/2) is simple to script and quick to test on isolated systems with minimal permanent change.
- Disabling HTTP/2 reduces protocol-level performance and feature benefits; teams must balance usability against security/compatibility.
- Uninstalling security updates creates exposure that must be mitigated via compensating controls.
- The regression’s variable behavior means a one-size-fits-all response may not work; expect per-host troubleshooting.
This incident reinforces a perennial truth for IT operations and developer tooling: updates that harden protocol behavior (HTTP/2, TLS defaults) can surface long‑standing compatibility assumptions in middleware and tooling. The immediate path for most teams is pragmatic: try the Defender definition update first, test the HTTP/2 registry toggle in an isolated environment, and only resort to KB uninstall when necessary — with a well-documented rollback and compensating controls in place. Monitor Microsoft’s official channels closely for an authoritative fix and plan to reverse temporary mitigations once the vendor patch arrives.
If affected systems are critical to production, coordinate changes with security and application teams before mitigation; for developers, document any binding or configuration changes in project repositories so CI and teammates are not surprised. The community has produced reproducible workarounds that restore local web hosting quickly, but each choice carries measurable trade-offs that must be managed.
Source: PiunikaWeb Latest Windows 11 update kills localhost IIS — here are the workarounds