A routine Patch Tuesday release on January 13, 2026 has left a significant portion of classic Outlook users scrambling: the Windows 11 cumulative update KB5074109 and a separate Outlook Current Channel build have each introduced regressions that render parts of the traditional Outlook experience unreliable or unusable for many people, with symptoms ranging from persistent freezes and processes that won't quit to encrypted messages that open only as unreadable attachments.
Microsoft shipped the January 13, 2026 Patch Tuesday cumulative update for Windows 11 as KB5074109 (OS Builds 26200.7623 and 26100.7623). The update was billed as a routine security and quality rollup addressing more than one hundred vulnerabilities and several platform issues — including fixes for battery drain related to Neural Processing Units (NPU) and Secure Boot certificate behavior — but it also introduced a set of unexpected side effects on some systems. At the same time, Microsoft’s Classic Outlook (Win32) client received a Current Channel update (Version 2511, Build 19426.20218) that produced a separate, client-side regression affecting Encrypt Only emails: recipients could no longer open messages encrypted using the File > Encrypt path, and the message content showed up only as a message_v2.rpmsg attachment. Microsoft has labeled both problems investigating and has published interim guidance and workarounds while engineering teams pursue permanent fixes.
Source: Windows Report https://windowsreport.com/latest-windows-11-update-leaves-classic-outlook-unusable-for-many/
Background
Microsoft shipped the January 13, 2026 Patch Tuesday cumulative update for Windows 11 as KB5074109 (OS Builds 26200.7623 and 26100.7623). The update was billed as a routine security and quality rollup addressing more than one hundred vulnerabilities and several platform issues — including fixes for battery drain related to Neural Processing Units (NPU) and Secure Boot certificate behavior — but it also introduced a set of unexpected side effects on some systems. At the same time, Microsoft’s Classic Outlook (Win32) client received a Current Channel update (Version 2511, Build 19426.20218) that produced a separate, client-side regression affecting Encrypt Only emails: recipients could no longer open messages encrypted using the File > Encrypt path, and the message content showed up only as a message_v2.rpmsg attachment. Microsoft has labeled both problems investigating and has published interim guidance and workarounds while engineering teams pursue permanent fixes. What broke and who’s affected
Classic Outlook — POP account hang and freeze after KB5074109
- Symptom: After installing KB5074109, users with POP account profiles reported Outlook processes that won’t exit properly (Outlook stays running in the background), Outlook that refuses to restart, and intermittent hangs or freezes while using the client. These behaviors mean Outlook cannot be restarted normally and can block email delivery, synchronization and user workflows.
- Scope: Microsoft’s advisory explicitly calls this an emerging issue and identifies classic Outlook (Outlook for Microsoft 365) with POP account profiles as the principal surface. The support post lists the January 13, 2026 update (KB5074109) as the triggering OS update. Microsoft is investigating and has not yet published a universal fix.
Classic Outlook — Encrypt Only messages fail to open after an Outlook client update
- Symptom: After Current Channel Version 2511 (Build 19426.20218) shipped to Outlook clients, recipients of messages encrypted with Encrypt Only encountered a Reading Pane prompt: “This message with restricted permission cannot be viewed in the reading pane until you verify your credentials.” Opening the message then exposed an attachment named message_v2.rpmsg, and the actual body remained unreadable inside the client.
- Scope: Microsoft’s guidance indicated the regression started with build 19426.20218 and affected recipients opening messages in the classic Outlook client. The Outlook team offered temporary workarounds and a rollback path to a prior working build for senders or administrators.
Why the failures matter
The two regressions have different technical triggers but converge on the same operational pain points for end users and IT teams.- Legacy protocols like POP are still widely used in small businesses, home offices, and some vertical markets. When Outlook processes cannot quit cleanly — leaving POP sessions or PST indexes locked — users find the client unusable or unstable. The result: lost productivity, ballooning helpdesk tickets, and the risk of file-level corruption if a stuck Outlook process is terminated forcibly.
- Encrypted email workflows are critical for regulated industries and corporate confidentiality. The Encrypt Only regression effectively blocks access to protected communications when using a specific UI path to apply encryption. That undermines secure mailflows and forces senders to alter practices or recipients to rely on alternate clients or web-based viewers. Until the bug is fixed, sensitive messages can be unreadable inside the desktop client.
Evidence: what Microsoft and independent outlets are saying
Microsoft has published support advisory pages marking both troubles as investigating and listing symptoms, affected builds, and temporary workarounds.- The Windows 11 KB5074109 knowledge base entry describes fixes and includes a Known Issue Rollback (KIR) mechanism and guidance for administrators; an Outlook-specific support topic links KB5074109 with POP account hangs and notes that teams are investigating.
- For the Encrypt Only issue, Microsoft’s Outlook support article acknowledges the regression after Current Channel Version 2511 (Build 19426.20218) and recommends temporary steps such as using the Options > Encrypt ribbon or reverting to the previous Outlook build.
Practical impact: who should be worried
- Consumers using POP accounts in classic Outlook: expect instability and potential inability to restart Outlook after closing it; consider avoiding the KB5074109 update until a fix is available or plan a rollback if affected.
- Small businesses and MSPs with legacy mail setups: be prepared for increased tickets and possible PST repair work if users force-kill Outlook processes or experience corrupted data files after repeated hangs. Third-party vendors and PST repair utilities have already published advisories offering remediation options where data corruption is suspected.
- Regulated organizations and anyone using Encrypt Only messages as part of governance or compliance: verify how encryption is being applied. If encryption is applied via the File > Encrypt dialog, recipients using classic Outlook builds affected by the regression may not be able to open messages. Temporarily switching to a different encryption UI path or using Outlook Web App (Outlook on the web) will preserve access.
- Enterprises that stage updates via WSUS or other management tools: use the Known Issue Rollback (KIR) guidance published with KB5074109 and consider blocking or delaying the update until a patched cumulative update is released. Microsoft’s KB page includes instructions for deploying a temporary Group Policy-based rollback for affected organizations.
Workarounds and mitigation — step‑by‑step
Below are practical steps for affected users and administrators. Apply changes with care and understand the security trade-offs before uninstalling security updates.1) Confirm the symptoms and collect diagnostics
- Check your Outlook account type: if you’re using POP, you are in the primary affected class for the KB5074109 hang issue. If you’re using IMAP or Exchange/Office 365, the Microsoft advisory indicates these setups are not showing the same hang behavior.
- Take screenshots of error messages, note build numbers (Windows build and Outlook version). These details are essential when opening a Microsoft support case or escalating with an MSP.
2) Use supported temporary workarounds for encrypted emails
- If you must send encrypted email, avoid the File > Encrypt path on affected Outlook builds. Instead:
- Use the Options > Encrypt ribbon command when composing the message; this alternative path has been reported to avoid the regression.
- Or use Outlook on the web or the New Outlook experience, which are not impacted by the Desktop client regression for Encrypt Only messages.
- If you are an administrator and must send mass or automated encrypted messages, consider rolling sender clients back to a prior working build (the Microsoft article names 16.0.19426.20186 as the version before the regression). Microsoft provided a Click-to-Run rollback command in its advisory.
3) Uninstall KB5074109 or apply Known Issue Rollback for POP hangs
- Uninstall via Settings: Windows 11 allows Settings > Windows Update > Update history > Uninstall updates. Select KB5074109 (if present) and uninstall. Microsoft cautions that some combined packages include servicing stack updates (SSUs) that cannot be removed by the Windows Update Standalone Installer. Follow Microsoft’s guidance when using removal commands.
- Use DISM/Remove-Package: Microsoft’s KB explains that removing the LCU from a combined package requires DISM /Remove-Package using the package name discovered via DISM /online /get-packages. This is an advanced step and typically requires admin rights and a reboot.
- For enterprise-managed devices, deploy the Known Issue Rollback (KIR) Group Policy referenced in the KB5074109 article. The KIR temporarily disables the change causing the issue until Microsoft ships a corrective update. Admins should follow Microsoft’s documented Group Policy deployment steps and test in their environment before broad roll-out.
4) Short-term user-level mitigations
- Start Outlook in Safe Mode to check if add-ins compound the issue: run
Outlook.exe /safe. If Outlook behaves correctly in Safe Mode, disable add-ins selectively. Microsoft guidance on troubleshooting Outlook lists Safe Mode and add-in isolation steps. - Create a new Outlook profile if your profile appears corrupt or Outlook fails to start normally. This can isolate profile corruption from client or OS behavior.
- If you are unable to access the machine or Windows will not boot normally after an uninstall attempt, use Windows Recovery Environment (WinRE) > Troubleshoot > Advanced options > Uninstall Updates. Microsoft documents the recovery uninstall process.
What IT departments and MSPs should do now
- Inventory endpoints for POP accounts and identify critical users who cannot be downgraded to a safer configuration without business disruption.
- Pause deployment of KB5074109 in managed channels until the risk is fully assessed or set up KIR in your test ring to disable the problematic change.
- Communicate clearly with users about safe behaviors: avoid the File > Encrypt path for protected messages, use Outlook Web App for critical encrypted mail, and refrain from force-killing Outlook processes unless instructed.
- Prepare standard operating procedures for rollback via DISM or Windows update removal for technicians, and ensure backups of PST files and user mail stores exist before performing manipulations that could risk data integrity.
Analysis: strengths, weaknesses, and risks
Notable strengths of Microsoft’s approach
- Transparent triage: Microsoft published targeted support articles and labeled the regressions as investigating, giving customers direct guidance and clear symptom descriptions. That rapid acknowledgement is helpful in reducing confusion and guiding troubleshooting.
- KIR and staged rollouts: The availability of Known Issue Rollback mechanisms and the staged Secure Boot certificate behavior shows Microsoft is balancing security with operational stability, enabling temporary reversions for enterprises while preparing a permanent fix.
Key weaknesses and operational risks
- Regression surface area: The fact that a security/quality rollup could interact with legacy Outlook usage patterns (POP) or a relatively narrow UI workflow (File > Encrypt) underscores the fragility of backward compatibility in complex, layered update systems. Organizations that rely on legacy protocols or specific client workflows are especially vulnerable.
- Communication gaps for average users: While Microsoft’s support articles are thorough, they assume a level of technical fluency to interpret build numbers and rollback commands. Less technical users will see their mail client become unusable and may not be comfortable uninstalling updates or switching to web clients. That increases helpdesk pressure and the chance of risky user behaviour (e.g., killing processes, installing unknown tools).
- Data integrity and PST risk: Repeated hangs, forced terminations, and improper recovery steps increase the risk of PST file corruption. If PSTs become damaged, recovery can be time-consuming and may require paid tools or professional intervention. This is a real downstream cost not covered by the initial security update.
Unverifiable or uncertain points
- Scope and exact number of affected users: Microsoft’s advisories and community reports show the issue affects many users, particularly those with POP accounts, but there is no public, verifiable metric (percentage of installs or number of tickets) published. Any claim that “millions” or a specific user count are affected would be speculative without internal telemetry or Microsoft release metrics. This lack of quantification should make organizations treat the risk seriously while acknowledging they may or may not be affected depending on their profile composition. Caution advised.
Long-term implications and takeaways
- IT modernization imperative: The incident reinforces the long-term risk of relying on legacy protocols like POP. Organizations still using POP should plan migration strategies to modern protocols (IMAP, Exchange/Microsoft 365) to reduce single-point fragility tied to old code paths.
- Hardening update pipelines: Enterprises should review update ring strategies and accelerate adoption of test/validation rings that include real-world email workflows — especially encrypted messaging and legacy account types — before a broad rollout. KIR is useful, but preventing regressions through more extensive pre-release testing would reduce operational fallout.
- Better user guidance and automation: Microsoft and vendors can reduce helpdesk load by improving auto-diagnostic tools and in-client guidance when a breaking change is detected. Administrators should also automate rollback and remediation scripts for well-understood scenarios to speed recovery.
Bottom line
Two separate update paths converged this month to create a real and immediate problem for classic Outlook users: a Windows 11 cumulative update (KB5074109) that introduced POP-account hangs and freezes, and an Outlook Current Channel update that blocked “Encrypt Only” emails in the Reading Pane. Microsoft has acknowledged both regressions and published support guidance and temporary workarounds, including a Known Issue Rollback for enterprise environments and rollback instructions for Office clients. Administrators should evaluate exposure, pause or block problematic updates in managed environments where necessary, deploy KIR or uninstall the update per Microsoft guidance if you are impacted, and prefer web-based or alternate encryption paths for sensitive mail until permanent fixes are released.Quick checklist — What to do right now
- Identify if you use POP accounts in classic Outlook; if yes, treat the update as high priority.
- For encrypted messages, avoid File > Encrypt on affected Outlook builds; use Options > Encrypt or Outlook on the web.
- If you are impacted and cannot wait for a patch, follow Microsoft’s uninstall or DISM removal guidance, or apply KIR in enterprise environments. Back up PSTs before proceeding.
- Monitor Microsoft’s support pages and change logs for updates marked Fixed; once Microsoft ships the corrective update, apply it via your validated deployment path.
Source: Windows Report https://windowsreport.com/latest-windows-11-update-leaves-classic-outlook-unusable-for-many/








