Microsoft has issued emergency out‑of‑band updates after a routine August Patch Tuesday rollup left built‑in recovery paths — including Reset this PC, the cloud‑based Fix problems using Windows Update, and management‑initiated RemoteWipe — unable to complete on a range of consumer and enterprise Windows client releases, and administrators should treat these fixes as high priority for affected fleets.
In the August 2025 Patch Tuesday cycle Microsoft delivered multiple cumulative security updates across Windows servicing branches. Within days, community telemetry and enterprise reports described a consistent failure pattern: attempts to perform local or cloud‑based resets would start and then abort with messages such as “There was a problem resetting your PC. No changes were made,” while some remote wipe jobs initiated through Microsoft Intune or other MDM tools failed to finish. Microsoft acknowledged the problem publicly on its Windows Release Health channel and prepared targeted out‑of‑band (OOB) updates to restore recovery functionality. This is not an aesthetic bug or a single‑device nuisance: recovery flows are the last‑resort tools administrators and consumers rely on to remediate corruption, sanitize devices for reassignment, or recover systems after malware or failed upgrades. Their sudden unreliability amplifies operational risk and support costs, and it directly affects security posture for managed fleets.
This pattern explains several observations:
When uncertainties remain — for example, anecdotal storage failures reported in narrow geography or by limited OEM images — apply conservative mitigations: hold updates in ringed deployments, require current backups before patching, and coordinate with OEM firmware/driver advisories.
This coverage synthesizes the reporting published in the supplied briefings and community threads together with Microsoft’s official KB pages and independent reporting to provide a practical, actionable guide for users and IT professionals navigating the August 2025 Windows reset and recovery incident. (support.microsoft.com, bleepingcomputer.com)
Source: Forbes Microsoft Confirms Emergency Windows Update—Your PC ‘Might Fail’
Source: gHacks Technology News Microsoft releases out-of-band update to fix Windows reset and recovery issue - gHacks Tech News
Background
In the August 2025 Patch Tuesday cycle Microsoft delivered multiple cumulative security updates across Windows servicing branches. Within days, community telemetry and enterprise reports described a consistent failure pattern: attempts to perform local or cloud‑based resets would start and then abort with messages such as “There was a problem resetting your PC. No changes were made,” while some remote wipe jobs initiated through Microsoft Intune or other MDM tools failed to finish. Microsoft acknowledged the problem publicly on its Windows Release Health channel and prepared targeted out‑of‑band (OOB) updates to restore recovery functionality. This is not an aesthetic bug or a single‑device nuisance: recovery flows are the last‑resort tools administrators and consumers rely on to remediate corruption, sanitize devices for reassignment, or recover systems after malware or failed upgrades. Their sudden unreliability amplifies operational risk and support costs, and it directly affects security posture for managed fleets.What happened — a concise timeline
- August 12, 2025: Microsoft ships the regular Patch Tuesday cumulative updates for multiple Windows client branches (the August security rollup). Several KBs are associated with those releases.
- Mid‑August 2025: Users and IT operations teams begin reporting failed Reset/Recovery attempts and RemoteWipe failures. Community analysis points to servicing/packaging metadata as the likely failure mode.
- August 18–19, 2025: Microsoft posts a Release Health advisory confirming the regression and the affected platforms, and the company publishes optional out‑of‑band cumulative updates on August 19 to repair the issue.
- August 19, 2025: Microsoft publishes OOB KBs for affected branches (for example, KB5066189 for Windows 11 servicing families and KB5066188/KB5066187 for Windows 10 and LTSC variants). Administrators are advised to apply the OOB updates if they have experienced the failure, or to install the OOB instead of the standard August rollup if they have not yet patched.
Which Windows versions and updates were affected
The confirmed impact covers multiple consumer and enterprise client branches but does not appear to include Windows Server SKUs. The primary affected families and originating August security KBs flagged in Microsoft’s advisory and community reporting include:- Windows 11, version 23H2 and 22H2 — originating August KBs tied to the regression.
- Windows 10, version 22H2 (and associated LTSC/IOT LTSC SKUs) — originating August KBs tied to the regression.
- KB5066189 — OOB for Windows 11 servicing families (OS Builds 22621.5771 and 22631.5771).
- KB5066188 — OOB for Windows 10 22H2 and some LTSC/IOT variants (build updates into the 19044/19045 family).
- KB5066187 — OOB for Windows 10 Enterprise LTSC 2019 and related IoT LTSC SKUs.
Technical cause — what likely broke
Field analyses and community troubleshooting converge on a servicing/packaging mismatch as the root trigger: metadata in servicing manifests referenced payloads that were missing, not hydrated, or otherwise mis‑ordered during the August cumulative process. The Windows Reset/Recovery flows depend on accurate servicing metadata, intact WinSxS payloads, and a properly configured Windows Recovery Environment (WinRE). When a packaging mismatch prevents the recovery engine from locating or reconstructing required components, reset flows abort and Windows rolls the operation back to preserve the system — which is what many users observed.This pattern explains several observations:
- The problem spans OEM images and managed images because servicing metadata is part of the update payload, not a hardware‑specific driver.
- Some branches (for example, Windows 11 24H2) were largely not affected by this specific reset regression, suggesting the packaging differences between servicing families mattered.
How Microsoft responded (analysis of the fix)
Microsoft’s swift issuance of non‑security, out‑of‑band cumulative updates is the correct operational response for a regression that disables recovery tooling. The OOB fixes share several important characteristics:- They are non‑security cumulative updates labeled as optional, and they supersede prior packages for their servicing families. Administrators therefore can apply the OOB instead of the August security rollup if they have not yet installed August updates. (support.microsoft.com, bleepingcomputer.com)
- Each OOB package bundles a Servicing Stack Update (SSU) with the LCU to ensure the servicing pipeline’s state is corrected before new payloads are installed. This is important because SSU ordering problems are commonly implicated in recovery failures.
- Microsoft published KB guidance and the updates are available via Windows Update (Optional updates), Windows Update for Business, the Microsoft Update Catalog, and WSUS/SCCM distribution paths for managed deployments.
What users and admins should do right now — step‑by‑step
- Check your OS build: go to Settings → System → About and note the OS build and version. This determines which OOB KB applies.
- Check whether you installed the August 12, 2025 security update (the originating monthly rollup). If you did and you have attempted or plan to use Reset/Recovery flows, plan to install the OOB fix. If you have not installed August updates, install the OOB package instead.
- Install the correct OOB update:
- Windows Update → Optional updates (look for the August 19, 2025 non‑security update).
- Or download and install the package manually from the Microsoft Update Catalog for offline or staged deployments.
- Reboot and verify: after installation, confirm the OS build changed to the OOB build listed in Microsoft’s KB page, and test a Reset / Fix problems using Windows Update flow only on a test device first if you operate at scale.
- For managed fleets: stage deployment in rings. Pilot the OOB on a small set of devices, validate Reset/RemoteWipe flows, then extend broadly. Use Intune or your deployment tool to push only the matching KB for the detected OS builds.
Practical impact and risks — why this incident matters
- Operational downtime: When Reset/Recovery flows fail, help desks must revert to manual reimaging or onsite recovery, which increases mean time to repair.
- Security and compliance: RemoteWipe failures impede rapid device sanitization in theft/loss scenarios; for organizations with data protection obligations, this can be material.
- Consumer pain: Home users may rely on Reset this PC when facing corruption; the failure converts a short troubleshooting step into hours of work and potential data risk if backups are stale.
- Trust in update process: Regressions in recovery tooling reduce confidence in automatic Windows servicing and raise the bar for test‑and‑pilot discipline before broad rollouts.
Secondary reports — storage and other problems (caveats)
Separate from the Reset/Recovery regression, some community reports flagged potential storage instability on certain systems after the August updates (notably under heavy sustained I/O on particular SSD models). These storage‑related reports were preliminary, under investigation by SSD vendors and Microsoft, and are not the same as the Reset/Recovery regression that OOB KBs addressed. Treat those storage reports as distinct and monitor vendor advisories and Microsoft’s Release Health for definitive guidance before assuming a broad hardware compatibility problem.When uncertainties remain — for example, anecdotal storage failures reported in narrow geography or by limited OEM images — apply conservative mitigations: hold updates in ringed deployments, require current backups before patching, and coordinate with OEM firmware/driver advisories.
Enterprise checklist — fast‑track actions for IT teams
- Immediately identify devices that installed the August 12, 2025 cumulative updates and flag those that have attempted Reset/RemoteWipe operations.
- Where possible, pause any automated workflows that trigger device resets or remote wipes until affected systems are patched with the OOB KBs.
- Deploy the OOB KB (KB5066189 / KB5066188 / KB5066187) to pilot devices first, validate recovery flows, then escalate to broad rollout using update rings.
- Maintain verified backup and imaging artifacts for a subset of critical endpoints so you can recover devices without relying solely on Reset/Recovery tooling.
Why this should change how organizations treat Patch Tuesday
The incident is a reminder that monthly cumulative rollups touch multiple interacting subsystems. Good practice now includes:- Ringed deployments: continue to stage updates through test, pilot, and broad rings.
- Faster telemetry loops: track Release Health notices and community reporting within 24–48 hours after major rollouts.
- Backup discipline: ensure recent images and file backups are available before applying mass updates.
- Update automation checks: validate that Servicing Stack updates are applied in correct order and that WSUS/SCCM catalogs reflect OOB packages promptly.
Strengths and weaknesses of Microsoft’s handling (critical analysis)
Strengths- Speed of response: Microsoft confirmed the issue publicly and shipped targeted OOB fixes within a week, which limited exposure time for vulnerable recovery flows.
- Targeted fixes: The OOB packages include SSU + LCU to address sequencing and hydrating issues — the right technical approach for this failure class.
- Clear guidance: Microsoft advised administrators to install OOB updates if affected and to apply the OOB instead of the regular August rollup if not yet patched.
- Mixed messaging on KB pages: Some standard KB pages initially showed “no known issues” while Release Health carried the confirmed advisory, creating confusion for admins relying only on KB pages. That inconsistency delays response and complicates triage.
- Scope of regression: The regression affected a broad range of client servicing families, including LTSC and IoT images, which increased remediation complexity for organizations with heterogeneous fleets.
- Collateral risk of cumulative packaging: When a cumulative rollup includes many fixes, the likelihood of an interaction regression rises; comprehensive preflight testing across the variety of enterprise images is still practically challenging.
Final recommendations and closing assessment
- For individual users: if you already installed the August 2025 security update and have experienced reset/recovery failures, install the matching OOB update (August 19, 2025 KB package) and test recovery flows on a non‑critical device after the update. If you haven’t installed August updates yet, install the OOB package instead of the older rollup. (bleepingcomputer.com, support.microsoft.com)
- For IT teams and service providers: prioritize detecting which devices applied the August rollup, hold reset/wipe automation until the OOB patch is validated, and push the relevant KB to affected devices after pilot validation. Maintain updated backup images to reduce reliance on Reset/Recovery during remediation.
- For risk managers and decision makers: treat this incident as a systemic reminder that updates are system changes. Invest in telemetry, staged rollouts, and rollback plans that assume a non‑zero probability of regressions in any large cumulative update.
This coverage synthesizes the reporting published in the supplied briefings and community threads together with Microsoft’s official KB pages and independent reporting to provide a practical, actionable guide for users and IT professionals navigating the August 2025 Windows reset and recovery incident. (support.microsoft.com, bleepingcomputer.com)
Source: Forbes Microsoft Confirms Emergency Windows Update—Your PC ‘Might Fail’
Source: gHacks Technology News Microsoft releases out-of-band update to fix Windows reset and recovery issue - gHacks Tech News
- Joined
- Mar 14, 2023
- Messages
- 101,500
- Thread Author
-
- #2
Microsoft pushed an emergency, out‑of‑band cumulative update on August 19, 2025 to repair a high‑impact regression that broke Windows’ built‑in reset and recovery flows — a failure that left some users and IT operations teams unable to run “Reset this PC,” the cloud‑reinstall Fix problems using Windows Update, or complete MDM‑initiated RemoteWipe jobs until fixes were installed.
The incident began after the August 12, 2025 Patch Tuesday cumulative updates were broadly distributed. Within days, telemetry and community reports described a consistent failure mode: recovery and reimage workflows that normally reboot into the Windows Recovery Environment (WinRE) would start, then immediately abort, rolling back the operation with messages such as “No changes were made.” The affected flows included:
Source: cyberpress.org Microsoft Issues Emergency Patch to Fix Windows Reset and Recovery Bug
Background / Overview
The incident began after the August 12, 2025 Patch Tuesday cumulative updates were broadly distributed. Within days, telemetry and community reports described a consistent failure mode: recovery and reimage workflows that normally reboot into the Windows Recovery Environment (WinRE) would start, then immediately abort, rolling back the operation with messages such as “No changes were made.” The affected flows included:- System → Recovery → Reset this PC (both “Keep my files” and “Remove everything” paths)
- System Recovery → Fix problems using Windows Update (cloud reimage)
- Management‑initiated RemoteWipe CSP operations via Intune/MEM
What made this different from typical Patch Tuesday handling
This was not a routine quality update: recovery flows are the last‑resort mechanisms that both home users and large enterprises rely on. When they fail, organizations face manual reimage operations, extended downtime and, in worst cases, incomplete device sanitization — a compliance risk for many regulated industries. Microsoft chose the OOB route to get a fix into hands quickly rather than waiting for the next monthly cycle.Affected platforms and KBs
Microsoft and community trackers mapped the issue to the August 2025 security rollups and published OOB fixes targeted to servicing branches:- Windows 11 (23H2 / 22H2) — OOB KB5066189 (OS Builds 22621.5771 and 22631.5771).
- Windows 10 (22H2 and LTSC/IOT LTSC variants) — OOB KB5066188 (OS Builds 19044.6218 and 19045.6218).
- Windows 10 Enterprise LTSC 2019 / IoT LTSC 2019 — OOB KB5066187 (OS Build 17763.7683).
Technical root cause: what happened (and what we can verify)
Public documentation from Microsoft, field engineering write‑ups and community forensic analysis converge on a consistent technical narrative: the regression behaved like a servicing / packaging mismatch. In plain terms, the recovery engine relies on accurate servicing metadata and correctly hydrated payloads in the component store (WinSxS) and WinRE. If metadata references payloads that are missing, misordered, or not applied in the expected sequence, WinRE cannot rehydrate required components and reset/recovery flows abort and roll back.- Microsoft’s support notes for the OOB KBs explain the packages address an issue introduced by the August 2025 security update that caused reset and recovery attempts to fail; the OOBs include SSU components to restore stable servicing sequencing.
- Independent community analysis repeatedly pointed at servicing manifest/payload hydration problems as the practical failure mode seen in device logs and field tests.
The ACPI.sys boot issue and its relationship to the August regression (clarifying the record)
Earlier in 2025 Microsoft had already responded to a separate, high‑visibility boot problem caused by the May 2025 security update KB5058405: some Windows 11 22H2/23H2 systems — particularly virtual machines running on Azure, Citrix or Hyper‑V — experienced an ACPI.sys failure with recovery error code 0xc0000098. Microsoft shipped an OOB cumulative (KB5062170) to address that specific boot failure. It is important to separate those two incidents:- The May 2025 ACPI.sys / 0xc0000098 issue was a boot/install problem caused by an interaction with the May cumulative; Microsoft published targeted OOB fixes (KB5062170). (bleepingcomputer.com, pcworld.com)
- The August 2025 reset/recovery regression was a servicing/WinRE failure class remedied by the August 19 OOB cumulative updates (KB5066189 / KB5066188 / KB5066187). (support.microsoft.com, bleepingcomputer.com)
What Microsoft changed in the OOB updates
The August 19 OOB packages implement the following practical changes:- Delivery of combined SSU+LCU packages to correct servicing stack sequencing and ensure payloads are present and applied in the correct order.
- Fixes in update orchestration paths used by reset and WinRE flows so those flows can locate and rehydrate necessary components during reset or cloud‑reinstall operations.
- Targeted builds for LTSC and IoT LTSC families to ensure backward compatibility for legacy enterprise images and appliances.
Enterprise impact: where the pain showed up
This regression disproportionately affected environments that depend on automated recovery and reprovisioning:- Azure Virtual Desktop (AVD), Hyper‑V clusters and Citrix hosted VDI images where image consistency and automated reprovisioning are essential.
- Managed fleets using Intune / Microsoft Endpoint Manager (MEM) that rely on RemoteWipe CSP for secure data sanitization during offboarding or device reclamation. RemoteWipe jobs were reported to begin and then stop, leaving devices in inconsistent states.
- Organizations using LTSC editions in mission‑critical roles where manual reimaging is operationally expensive.
Immediate remediation and rollout guidance
Practical steps organizations and advanced users should take now:- Inventory affected devices and map OS builds (Settings → System → About). Confirm whether devices are on impacted build families before mass deploy.
- Pilot the appropriate OOB package in a controlled ring:
- KB5066189 for Windows 11 22H2/23H2 devices.
- KB5066188 for Windows 10 22H2 / LTSC 2021 families.
- KB5066187 for LTSC 2019 / IoT LTSC 2019 SKUs.
- Use Microsoft Update, WSUS, Microsoft Update Catalog or Windows Update for Business to push the OOB packages. Microsoft made standalone packages available for manual deployment from the Update Catalog.
- Rehearse reset/recovery operations in the pilot ring: verify Reset this PC, Fix problems using Windows Update, and RemoteWipe flows behave as expected after the patch.
- Maintain offline installation media and recovery plans for devices where remote remedial steps are critical (for example, kiosks, point‑of‑sale and medical devices).
Parallel identity‑stack hardening: Netlogon and Kerberos changes you must track
While the reset/recovery patching story dominated headlines in mid‑August, Microsoft concurrently advanced a set of identity‑related hardening updates that carry their own operational compatibility risks.Netlogon RPC hardening — KB5066014 (CVE‑2025‑49716)
On August 13, 2025 Microsoft documented Netlogon RPC hardening under KB5066014 to address CVE‑2025‑49716 — a denial‑of‑service where unauthenticated Netlogon RPC sequences could exhaust DC resources. The hardening blocks certain anonymous RPC calls to domain controller location services by default and adds a DCLocatorRPCSecurityPolicy registry toggle to switch between Enforcement, Audit and Disabled modes to help administrators stage deployment. Samba and other third‑party products that depend on older, unauthenticated Netlogon behaviors must validate compatibility and, where necessary, update to vendor‑supported versions. Key operational notes:- Install patches to domain controllers and servers hosting DC roles as the priority action.
- Use Audit Mode first to detect and log affected RPC calls (Event 9015 / 9016) before moving to Enforcement.
- Interoperability testing with Samba, storage appliances and third‑party AD integrations is essential to avoid authentication or file‑share breakage.
Kerberos PAC validation enforcement (CVE‑2024‑26248 / CVE‑2024‑29056)
Microsoft’s phased PAC (Privilege Attribute Certificate) validation changes — intended to fix weaknesses that could allow spoofed PAC signatures — progressed through Compatibility and Enforced phases beginning in April 2024 and tightened further in 2025. Administrators must ensure:- Domain controllers and clients are updated to the April 9, 2024 (and later) guidance baseline.
- Cross‑forest trust and third‑party authentication providers (such as ADFS or federated IdP products) validate NTAuth certificate store entries and support the required Kerberos PAC signature validation behavior.
- Deprecated cryptography (DES) is retired and modern AES algorithms are deployed where required.
Strengths and risks of Microsoft’s response — a critical read
Notable strengths
- Speed of remediation. Microsoft published targeted OOB packages within a week of confirming the issue, providing administrators with concrete fixes before the next Patch Tuesday. That rapid cadence reduced the window where fleet recovery flows remained nonfunctional.
- Corrective packaging choice. Bundling SSU+LCU is a reasonable engineering fix when sequencing or payload hydration is implicated: it addresses the installation orchestration code paths that WinRE and reset flows depend on.
- Clear targeted guidance. Microsoft explicitly named affected scenarios and provided optional OOB packages rather than forcing an automatic replacement for unaffected devices.
Material risks and remaining pain points
- Opaque post‑mortem. The lack of a detailed engineering post‑mortem leaves some ambiguity for administrators conducting root‑cause forensics; this increases the risk of repeating similar regressions if the servicing pipeline is not fully audited. Field analyses point to servicing metadata mismatches, but that remains an inference until Microsoft publishes deeper technical detail.
- Combined SSU permanence. SSUs are effectively permanent once applied, complicating rollback. That makes careful pilot testing more important and raises the operational cost for environments that must be able to revert changes quickly.
- Compounding identity hardening. Netlogon hardening (KB5066014) and Kerberos PAC enforcement are necessary security steps, but the timing and breadth of these policy changes increase the chance of interoperability breakage across heterogeneous AD ecosystems, especially where Samba or older appliances are in use. Microsoft provided Audit/Disabled toggles for KB5066014, but those toggles are temporary staging aids, not long‑term compatibility masks. (support.microsoft.com, windowsforum.com)
Practical recommendations for Windows admins (prioritized checklist)
- Prioritize patching domain controllers and Windows Server hosts for KB5066014 (Netlogon hardening) immediately, and run Audit Mode while confirming third‑party compatibility.
- Pilot the August 19 OOB updates (KB5066189/KB5066188/KB5066187) in a small ring, then expand only after validating Reset and RemoteWipe flows. (support.microsoft.com, bleepingcomputer.com)
- Maintain offline recovery media and documented manual reimage procedures for critical endpoints that cannot be patched immediately.
- Audit certificate infrastructure and NTAuth store contents if you rely on cross‑forest trusts or third‑party authentication providers; prepare to enable enforced Kerberos PAC validation only after confirming compatibility.
- Decommission DES and legacy crypto in favor of AES where Kerberos or NTLM interactions persist.
- Coordinate with OEMs and appliance vendors on firmware and driver compatibility for any devices running specialized images (kiosks, medical devices, PoS).
What we still don’t know — and what to watch for
- A definitive, single‑line engineering root cause from Microsoft that ties together the servicing metadata observations with the exact code or manifest failure mode is still pending. Until Microsoft publishes a full post‑mortem, the servicing/packaging mismatch explanation is the best supported field interpretation but remains technically inferential. Flag any downstream remediation that presumes more confidence than that.
- The long‑term plan for Netlogon toggles (Audit/Disabled) has not been finalized; Microsoft’s guidance suggests these modes may be removed at a future date, making full compatibility with Enforcement Mode inevitable. Track vendor updates (Samba, storage appliances, NAS vendors) to ensure long‑term compatibility.
- Keep an eye on Windows Release Health and Microsoft’s support documentation for any new known issues introduced by the OOB packages; Microsoft’s initial KBs reported no known issues, but wide fleet rollouts can surface environment‑specific failures that were not visible in pilots.
Conclusion — a balance of urgency and discipline
The August 2025 reset/recovery regression was a blunt reminder of how brittle complex servicing pipelines can be when they interact with diverse firmware, OEM images and enterprise provisioning stacks. Microsoft’s rapid OOB response restored critical recovery capabilities — an appropriate operational play — but the episode highlights two strategic needs for organizations:- Build robust change control and pilot processes that validate not only functional behavior but also servicing and recovery scenarios (Reset this PC, WinRE and cloud reimage) before mass deployment.
- Treat identity hardening (Netlogon and Kerberos changes) as a long‑lead modernization project that requires certificate hygiene, vendor coordination and staged enforcement to avoid breaking authentication and trust chains.
Source: cyberpress.org Microsoft Issues Emergency Patch to Fix Windows Reset and Recovery Bug
Similar threads
- Replies
- 0
- Views
- 226
- Article
- Replies
- 0
- Views
- 319
- Article
- Replies
- 0
- Views
- 501
- Article
- Replies
- 0
- Views
- 21
- Replies
- 2
- Views
- 163