Microsoft’s first security update for Windows 10 in 2026, KB5073724, is a compact but consequential patch: it’s a security-only cumulative for Extended Security Update (ESU) and LTSC devices that removes legacy modem drivers, prepares devices for Microsoft’s replacement Secure Boot certificates, and updates a bundled SQLite component — and Windows 10 systems enrolled in ESU should install it now.
Windows 10 left mainstream support in late 2025; Microsoft is now delivering only security updates to eligible machines through the Extended Security Update (ESU) program and via LTSC servicing. KB5073724 is the January 13, 2026 cumulative update for Windows 10 versions 22H2 and 21H2 under ESU/LTSC and advances systems to builds 19045.6809 (22H2) and 19044.6809 (21H2). This release is not a feature update — it is explicitly a security and quality rollup with three operationally important changes:
Source: BetaNews Windows 10 users signed up for ESU should install the KB5073724 update right now
Background
Windows 10 left mainstream support in late 2025; Microsoft is now delivering only security updates to eligible machines through the Extended Security Update (ESU) program and via LTSC servicing. KB5073724 is the January 13, 2026 cumulative update for Windows 10 versions 22H2 and 21H2 under ESU/LTSC and advances systems to builds 19045.6809 (22H2) and 19044.6809 (21H2). This release is not a feature update — it is explicitly a security and quality rollup with three operationally important changes:- Removal of four legacy in-box modem drivers (affecting some hardware that still depends on those drivers).
- Inclusion of device-targeting metadata and staged logic to safely deliver the new 2023 Secure Boot certificates to eligible devices.
- An update to the Windows-packaged WinSqlite3.dll to reduce false-positives by third‑party security software.
Why KB5073724 matters now
Secure Boot certificate renewal and the June 2026 deadline
The single most time-sensitive element bundled with KB5073724 is Microsoft’s coordinated push to update Secure Boot certificates in device firmware (KEK/DB entries). The original Microsoft-supplied Secure Boot certificates from 2011 begin expiring starting in June 2026, and Microsoft has published replacement 2023 certificates and a deployment plan to avoid mass boot or update failures. Devices that do not receive new certificates before expiration risk losing the ability to trust and update pre‑boot components and, in some scenarios, may face boot failures or blocked updates. KB5073724 adds a subset of high-confidence device targeting data into Windows quality updates so Microsoft can automatically deliver the new certificates to devices that demonstrate successful, safe update behavior. The rollout is intentionally gated — certificates are delivered only after devices show sufficient successful update signals — to reduce the risk of applying a certificate change on hardware that cannot accept it. This reduces the chance of causing a large-scale boot disruption, but it does not remove the need for administrators and power users to plan and confirm firmware compatibility.Attack-surface reduction: removal of legacy drivers
KB5073724 removes these legacy modem drivers from the in-box Windows image:- agrsm64.sys (x64) and agrsm.sys (x86)
- smserl64.sys (x64) and smserial.sys (x86)
Small but important quality fixes
KB5073724 updates WinSqlite3.dll, the Windows-core packaging of SQLite that some security tools incorrectly flagged as vulnerable. This reduces false‑positive detections from endpoint protection products; note that application‑specific sqlite3.dll copies are outside Windows and must be updated by the app owner if they trigger alerts.Immediate practical guidance (what to do first)
Short, prioritized checklist for administrators and informed consumers:- Confirm eligibility and current build: open Winver or Settings → System → About and verify you are on Windows 10 version 22H2 or 21H2 as applicable for your SKU. ESU consumer enrollment requires 22H2 in many cases.
- Ensure the latest Servicing Stack Update (SSU) is installed before applying KB5073724 (Microsoft combines the SSU and LCU; an up-to-date SSU avoids installation errors). KB5068780 is the SSU referenced for these builds.
- Inventory devices for dependency on the removed modem drivers. Identify any endpoints using analog or serial modem hardware and plan remediation or isolation for those devices.
- Coordinate with OEMs for BIOS/UEFI firmware updates that enable devices to accept Microsoft’s new Secure Boot certificates, especially for older systems. Firmware availability varies by vendor and model.
- Pilot the update in a representative test ring that includes: different OEM families, BitLocker‑protected devices, devices with recovery workflows (WinRE), and endpoints with legacy peripherals. Validate BitLocker recovery, imaging and cloud reinstallation flows.
Step-by-step: Installing KB5073724 safely
- Check Windows version: Run winver and confirm build family (19044/19045).
- Update the Servicing Stack (if needed): Install the latest SSU referenced by Microsoft for your build (the KB entry for KB5073724 references the combined SSU package KB5068780). Reboot.
- From Settings → Windows Update, click Check for updates and install KB5073724 when offered. For systems that do not get the patch via Windows Update, download the stand‑alone package from the Microsoft Update Catalog and install the SSU first if required.
- Reboot and verify: confirm the OS build increment (19045.6809 or 19044.6809) and check Update History for a successful LCU + SSU install.
- Monitor for post-deployment issues: watch Windows Event logs for Secure Boot / certificate enrollment events and platform‑specific failure events. Microsoft documents event IDs and registry keys that are useful during rollout diagnostics; capture these centrally (SIEM, event forwarding) for fleet-wide visibility.
Deployment considerations for enterprises
Inventory, pilot, stage
Treat KB5073724 as an operations project, not a routine update. Start with an inventory of:- Devices with legacy modem/serial hardware.
- Machines with custom boot flows or non‑standard UEFI firmware.
- Platforms with constrained update windows (medical equipment, manufacturing controllers).
- A small Canary ring that includes BitLocker and WinRE scenarios.
- A broader pilot that samples across OEM families and driver stacks.
- A staged production rollout with monitoring windows and rollback plans.
Firmware coordination and OEM dependencies
Microsoft’s certificate updates involve writing KEK/DB entries into firmware on supported platforms. Not all UEFI implementations accept OS-initiated updates in the same way, and some OEMs will require firmware-level updates to accept the new 2023 certificates. Coordinate early with OEM support channels to:- Obtain a list of minimum BIOS/UEFI revisions that accept the 2023 certificates.
- Schedule firmware deployment before broad OS-side certificate delivery.
- Validate on representative devices that KEK/DB changes succeed and do not trigger BitLocker recovery or other pre-boot failures.
Telemetry and staging logic
Microsoft will attempt to update certificates automatically on many devices, but the update is gated by confidence signals and diagnostic telemetry; it is not an unconditional push. Administrators should not rely solely on Microsoft-managed delivery for devices that cannot share diagnostic telemetry or that are blocked by firewall policies. In such cases, manual certificate enrollment or OEM firmware updates will be necessary.Risks, known unknowns, and mitigations
Risk: Loss of legacy modem functionality
Impact: Any hardware that depends on the four removed drivers will stop working. This affects fax machines, analog modems, certain vertical‑market devices, and bespoke serial/modem integrations. Mitigation: inventory and pre-deploy vendor-supplied drivers or isolate affected hosts behind controlled networks until replacement or remediation is available.Risk: Firmware that rejects certificate updates
Some older firmware will not accept KEK/DB writes initiated by the OS; such devices will not receive the new certificates via Microsoft’s automated path. They may require a vendor firmware update or manual certificate provisioning. Mitigation: work with OEMs, apply firmware updates first where required, and maintain compensating controls (network segmentation, endpoint detection) for devices that cannot be upgraded.Risk: BitLocker recovery prompts and recovery workflow disruption
Certificate and firmware changes touch pre‑boot areas and can cause BitLocker to request recovery keys if the platform’s secure state is perceived as altered. Mitigation: ensure recovery keys are backed up, test recovery scenarios during pilots, and include BitLocker key escrow verifications in your rollout plan.Risk: Unclear or changing rollout status
Microsoft’s KB currently reports no known issues, but post-deployment telemetry sometimes surfaces regressions. Treat the “no known issues” statement as a current snapshot, not a guarantee. Plan for a monitoring window after deployment and be prepared to pause rollouts if hardware incompatibilities or widespread failures appear.Unverifiable or variable claims (flagged)
- Exact CVE counts and severity breakdowns for the broader January 2026 Patch Tuesday vary between trackers; use Microsoft’s Security Update Guide and vendor advisories for canonical counts. Different aggregators may report slightly different totals depending on whether they include third‑party components. This numeric variance is normal and should not distract from prioritizing high-impact fixes.
Operational checklists and recommended commands
Quick device checks (administrators)
- Confirm OS build: winver
- Check Secure Boot state (PowerShell): Confirm‑SecureBootUEFI / Get‑SecureBootUEFI
- Query event logs for certificate enrollment and Secure Boot errors (Event Viewer / centralized SIEM).
Recommended rollout sequence (summary)
- Inventory devices and identify legacy modem dependency.
- Obtain and stage OEM firmware updates where required.
- Update Servicing Stack (SSU) on test machines.
- Install KB5073724 in a test ring; validate boot/recovery/BitLocker scenarios.
- Stage broader rollout with monitoring and fallback plan.
- For unreachable or non-compliant firmware devices, apply compensating network/endpoint mitigations and schedule hardware refresh or vendor remediation.
The balance of benefits and operational pain
KB5073724 shows a pragmatic approach to platform hardening after a product reaches the end of mainstream support: Microsoft is removing orphaned kernel code that is difficult to maintain while also taking responsibility for renewing the pre‑boot trust anchors that devices rely on to remain securable. The benefits are straightforward:- Reduced kernel attack surface by removing legacy drivers.
- Continuity of Secure Boot protections through a managed certificate renewal process.
- Reduced false positives for security tools by updating packaged WinSqlite3.dll.
Final recommendations — practical, prioritized
- If you run a single ESU‑enrolled Windows 10 PC that is internet‑facing or used for sensitive tasks: install KB5073724 as soon as you confirm the SSU is installed and you have a backup and the BitLocker recovery key accessible. Use Settings → Windows Update or the Microsoft Update Catalog to apply the package.
- If you manage a fleet: treat KB5073724 as an operations project — inventory, pilot, firmware coordination, staged rollout, and monitoring are mandatory. Do not push the update blindly; confirm vendor firmware readiness for certificate enrollment on devices that require it.
- For sites that still rely on analog modems or fax devices: map affected hardware now and contact OEMs for signed replacement drivers or plan for hardware replacement. Do not assume legacy drivers will remain functional after KB5073724.
Conclusion
KB5073724 is modest in size but significant in consequence. It’s both a security patch and an operational checkpoint for Windows 10’s post‑mainstream lifecycle: Microsoft is shrinking legacy kernel attack surface, preparing devices for a coordinated Secure Boot certificate renewal ahead of June 2026 expirations, and resolving a packaged component false‑positive. For ESU‑enrolled systems and LTSC installations, the correct response is immediate, measured action: verify prerequisites (SSU, firmware), inventory legacy dependencies, pilot carefully, and then deploy. Doing so will reduce exposure to active threats while avoiding the avoidable operational surprises that come from firmware and driver changes. Note: Microsoft’s advisories and KB entries are the authoritative references for dates, package names and supported builds; those pages currently document the June 2026 certificate expirations and the KB5073724 contents, but the operational status and “known issues” sections can change as real‑world telemetry arrives — plan for that eventuality.Source: BetaNews Windows 10 users signed up for ESU should install the KB5073724 update right now
