Microsoft pushed a fix after a WinAppSDK release accidentally broke Microsoft Store installs and updates, but until you apply the patch or follow the advised workarounds many users on Windows 10 version 22H2 will see app installs fail with the cryptic “Something happened on our end” or error 0x80073CFA.
In mid-November 2024 a servicing update to the Windows App SDK (WinAppSDK) introduced a regression that interfered with the package servicing stack used by Microsoft Store apps. The result: users attempting to update, install, or uninstall certain packaged apps — including widely used titles that rely on the modern Windows App SDK — began to hit failures and opaque error messages. Microsoft identified the problematic WinAppSDK release as version 1.6.2 and issued guidance and a patch path to restore normal app-management behavior.
This article explains exactly what happened, who is affected, why the issue occurred, and the practical step‑by‑step workarounds administrators and enthusiasts can use now to get apps installing again. It also evaluates the short- and longer-term risks for users and IT teams and suggests best practices to avoid or mitigate similar incidents in the future. Where statements are not directly verifiable in public-facing advisories, that uncertainty is flagged.
Microsoft’s internal analysis traced the failures to that WinAppSDK update, which was subsequently pulled from distribution. The company then shipped a Windows update — KB5046714 — as a fix for affected Windows 10 22H2 systems. That update is classified as a non‑security, optional cumulative update, meaning it typically does not install automatically and requires manual selection or an explicit download from update catalogs.
Two important technical details to remember:
Caveat: if you are not an IT admin or are uncomfortable with command-line repairs, it’s safer to apply the KB or wait for the automated rollout.
This “install three times” instruction is counterintuitive and feels like a surgical workaround to deal with an unusual servicing-state problem. It is worth flagging that:
This episode underscores two perennial truths for Windows administrators and developers: first, keep update processes and deployment pipelines well-tested and observable; second, when platform runtimes change, assume impact beyond a single app — and plan rollouts accordingly. Address the immediate problem with the KB or tested PowerShell steps, then use the incident to tighten testing and dependency controls so the next runtime regression is caught before it reaches production.
Source: HotHardware A Recent Windows Update Is Causing App Installs To Fail, Here's The Workaround
Background / Overview
In mid-November 2024 a servicing update to the Windows App SDK (WinAppSDK) introduced a regression that interfered with the package servicing stack used by Microsoft Store apps. The result: users attempting to update, install, or uninstall certain packaged apps — including widely used titles that rely on the modern Windows App SDK — began to hit failures and opaque error messages. Microsoft identified the problematic WinAppSDK release as version 1.6.2 and issued guidance and a patch path to restore normal app-management behavior.This article explains exactly what happened, who is affected, why the issue occurred, and the practical step‑by‑step workarounds administrators and enthusiasts can use now to get apps installing again. It also evaluates the short- and longer-term risks for users and IT teams and suggests best practices to avoid or mitigate similar incidents in the future. Where statements are not directly verifiable in public-facing advisories, that uncertainty is flagged.
What happened: symptoms and immediate impact
Short version: packaged app operations broke for affected systems.- Symptom: attempts to update or uninstall Microsoft Store / packaged apps returned the generic Microsoft Store error “Something happened on our end.” In some admin flows the error presented as 0x80073CFA when PowerShell or servicing APIs were used.
- Scope: the issue was reported primarily on Windows 10 version 22H2 devices running apps built against the affected WinAppSDK release. It did not broadly impact Win32 apps that don’t use the Windows App SDK.
- Real-world friction: business users and consumers reported failures to update critical apps such as Microsoft Teams and other Store-packaged applications, leaving feature or security fixes unavailable until the servicing stack could be repaired.
Root cause: WinAppSDK 1.6.2 and the servicing stack
At the technical core was a regression introduced in the WinAppSDK servicing update (published November 12, 2024) that changed how certain packaged app servicing operations were processed. The Windows App SDK serves as a bridge between modern app models (WinUI/WinRT/UWP packaging) and the platform’s servicing mechanisms; a fault there can cascade into the Store and installation pipeline.Microsoft’s internal analysis traced the failures to that WinAppSDK update, which was subsequently pulled from distribution. The company then shipped a Windows update — KB5046714 — as a fix for affected Windows 10 22H2 systems. That update is classified as a non‑security, optional cumulative update, meaning it typically does not install automatically and requires manual selection or an explicit download from update catalogs.
Two important technical details to remember:
- The problem was not a general Windows security patch or core OS update; it was an incompatibility in a framework (WinAppSDK) many Store apps consume. That distinction explains the focused impact on packaged apps rather than system services at large.
- Because WinAppSDK is consumed by developers and apps, some devices may have received the bad component automatically when an app pulled it as a dependency, creating a confusing mix of devices affected even among machines with identical Windows Update histories.
Who is affected — concise checklist
- Users running Windows 10 version 22H2.
- Machines with packaged apps built on WinAppSDK where the system has the problematic 1.6.2 servicing present.
- Organizations using Microsoft Store for Business or updating Store-packaged applications centrally may see broader operational impact if many endpoints have the bad SDK state.
The official fix and the recommended immediate workaround
Microsoft’s remediation path came in two parts:- Primary: a Windows update patch (KB5046714) that resolves the servicing stack issues caused by the faulty WinAppSDK servicing. Installing this update restores normal update/uninstall behavior for affected Store apps.
- Interim/manual: Microsoft also documented PowerShell‑based remediation instructions for administrators who need an immediate workaround before the KB is available or rolled out. These commands re-register or repair the Windows App Runtime/WinAppSDK components so the package servicing operations succeed again.
Step‑by‑step: How to check if your device is affected
Run this PowerShell command to see whether a problematic WinAppSDK runtime is installed (example form used by Microsoft in guidance):- Open PowerShell as Administrator.
- Run:
Get-AppxPackage WindowsAppRuntime.1.6 -AllUsers | Where { $_.Version -eq '6000.311.13.0' } - If the command returns a package entry, the device has the specific runtime version associated with reported failures and should be remediated.
Step‑by‑step: Installing KB5046714
- Open Settings → Update & Security → Windows Update.
- Click “Check for updates.”
- Under “Optional updates,” look for KB5046714 and select it for installation.
- Reboot when prompted.
- Re-try updating or uninstalling the previously failing apps.
PowerShell workaround (when you can’t or won’t install the optional KB immediately)
For power users and IT admins the PowerShell remediation offers a way to fix app servicing without waiting for KB deployment. The guidance broadly consists of:- Re-registering the Windows App Runtime / WinAppSDK packages for all users.
- Invoking appx package repair cmdlets or removing and re-adding affected runtime components.
- Restarting the system and retrying the package operation.
Caveat: if you are not an IT admin or are uncomfortable with command-line repairs, it’s safer to apply the KB or wait for the automated rollout.
The oddball triple-install note — what it is and what we could not fully verify
Some guidance circulating in community and administrative notes recommended uninstalling the bad WinAppSDK version (1.6.2) and installing the replacement WinAppSDK 1.6.3 three times in succession. The rationale provided by Microsoft in some communications was that installer state transitions were required multiple times to fully repair lingering servicing entries on affected machines.This “install three times” instruction is counterintuitive and feels like a surgical workaround to deal with an unusual servicing-state problem. It is worth flagging that:
- This triple-install step appears in Microsoft’s suggested remediation notes circulated to admins, but it is not standard practice and feels like a workaround for deep servicing-layer inconsistencies rather than a robust fix.
- Because the triple-install sequence is an exceptional step, administrators should document, pilot, and validate it on a small set of devices before rolling it out broadly.
Risks, trade‑offs, and what to watch for
Applying fixes is not without tradeoffs. Consider these points before choosing a remediation path.- Optional update risk: KB5046714 was released as optional. Optional LCUs sometimes carry minor regressions; weigh the risk of leaving critical apps unpatched versus the small chance an optional fix introduces unrelated issues.
- PowerShell caveats: manual PowerShell remediation can require elevated privileges and precise commands. A mistyped command can remove or corrupt packages. Always run PowerShell scripts in an administrator session and, where possible, test in a lab or on a single pilot machine.
- Enterprise distribution complexity: enterprises that use WSUS or SCCM should verify how optional updates are delivered in their environment and test KBs on pilot rings. Some deployment paths (WSUS) may require catalog resync or approvals for the optional fix to appear.
- Residual state: devices that previously failed updates or uninstalls may retain partial package state that requires deeper servicing stack repairs (DISM / SFC or in-place repairs) if the simple KB or PowerShell steps don’t restore normal behavior.
Recommendations — immediate and strategic
For typical Windows 10 users (non‑enterprise):- Check Windows Update → Optional updates for KB5046714 and install it if present. Reboot and verify app install/update flows.
- If you repeatedly rely on Microsoft Store apps for daily work, consider installing the update proactively rather than waiting for an automatic roll‑out.
- Validate: run the PowerShell detection query across a representative device set to identify machines with the 1.6.2 runtime.
- Pilot: deploy KB5046714 to a pilot ring first and verify that it resolves app update/uninstall issues without introducing other regressions.
- Staged rollout: once validated, push the update through your standard deployment channels (SCCM/Intune) and monitor telemetry for unexpected side effects.
- Have PowerShell remediation ready: distribute a vetted PowerShell remediation script as a fallback for devices that can’t immediately receive the KB. Ensure scripts are signed and tested.
- Review dependency management: avoid implicit automatic runtime upgrades in production appliances where possible. Pin and test against runtime versions to avoid unexpected shifts when a dependency changes.
- Instrument your apps: detect and report servicing failures early (telemetry around package updates/uninstalls) so you can act before a user is blocked.
Broader implications and lessons for Microsoft’s update process
This incident is a reminder that modern OS ecosystems depend on layered components where a flaw in a shared SDK can have outsized effects. Key takeaways:- Release discipline: SDK and runtime releases that are widely consumed should undergo aggressive cross-platform and servicing tests before being pushed broadly. The WinAppSDK regression showed how a single servicing change can cascade into numerous apps.
- Rollback and distribution choices: Microsoft’s decision to pull the problematic WinAppSDK and offer a non‑security KB recognizes the need for surgical fixes, but making the patch optional slowed automatic remediation for users who skip optional updates. The incident reinforces the value of rapid, well-communicated rollouts for fixes that affect functionality.
- Communication and admin tooling: detailed, tested PowerShell remediation scripts are a valuable stopgap. Still, enterprises benefit when vendors provide a single, documented, low-risk deployment path (signed MSI/MSU) for fixing platform-level regressions.
What we could not fully verify (and why it matters)
A few items reported in community threads and admin notes deserve caution:- The exact necessity of installing the replacement WinAppSDK (1.6.3) three times is difficult to generalize; while Microsoft circulated that guidance in some remediation notes, it reads as an exceptional step to clear specific servicing states. Treat that guidance as situational and pilot it before mass application.
- The broader prevalence numbers (percentage of machines affected) are not publicly enumerated; reports described a meaningful cross-section of corporate and home users, but there’s no single official metric showing incidence rates. Expect variability by environment and application mix.
Conclusion
The WinAppSDK servicing regression that surfaced in November 2024 is an important case study in how shared runtimes and SDKs can disrupt app servicing and user productivity. For affected Windows 10 22H2 devices, the practical path to recovery is clear: check for and install KB5046714, or apply Microsoft’s PowerShell remediation guidance in controlled scenarios. Enterprises should validate in pilot rings, have fallback scripts available, and treat the unusual triple‑install instruction as a high‑risk, last‑resort step that requires testing.This episode underscores two perennial truths for Windows administrators and developers: first, keep update processes and deployment pipelines well-tested and observable; second, when platform runtimes change, assume impact beyond a single app — and plan rollouts accordingly. Address the immediate problem with the KB or tested PowerShell steps, then use the incident to tighten testing and dependency controls so the next runtime regression is caught before it reaches production.
Source: HotHardware A Recent Windows Update Is Causing App Installs To Fail, Here's The Workaround