Microsoft released the August 12, 2025 cumulative security update for Windows 11, version 24H2 — KB5063878 (OS Build 26100.4946) — a routine but important monthly package that bundles the latest cumulative fixes, updates to several AI components (targeted at Copilot+ devices), and an updated servicing stack. Administrators and home users should pay particular attention this month because the release reiterates Microsoft’s advance warning about the Windows Secure Boot certificate expiration beginning in June 2026 and includes preparatory guidance for the certificate rollover that could otherwise disrupt secure boot and update delivery. (support.microsoft.com)
Windows’ monthly cumulative update model bundles quality and security fixes together so that devices receive a compact, single maintenance package. Since Microsoft began combining the servicing stack update (SSU) with the latest cumulative update (LCU) for Windows 11, administrators now typically apply a single combined package that contains both the servicing stack improvements and the security/quality fixes themselves. The servicing stack is the OS component that installs updates; keeping it current is essential because outdated servicing stacks can cause update failures or even boot problems in rare states. Microsoft’s SSU guidance explains why SSUs exist, that SSUs should precede LCUs when installed separately, and why SSUs are effectively non-removable once applied. (support.microsoft.com)
This August release follows that model: the bundled package for Windows 11, version 24H2 updates the servicing stack and installs the cumulative fixes in one combined operation. The KB entry supplied with the update lists the build number, the AI component versions included (for Copilot+ PCs), and typical deployment options: Windows Update, Windows Update for Business, WSUS, and the Microsoft Update Catalog for standalone MSU packages. Deployment notes and DISM / Add‑WindowsPackage examples are included for air‑gapped or manually managed fleets.
The update’s strengths lie in Microsoft’s early notice and documented deployment options: the company has published actionable guidance that, if followed, should let most organizations and consumers transition without disruption. The major operational hazard is not the KB itself but the certificate rollover timeline: mismanaged fleets, unpatched firmware, or air‑gapped systems could see real impacts to secure boot trust and future boot‑time updateability if they do not act. In short: apply testing discipline now, coordinate with OEMs, and treat the June/October 2026 Secure Boot deadlines as immovable milestones in your update calendar. (support.microsoft.com, techcommunity.microsoft.com)
Conclusion
KB5063878 (OS Build 26100.4946) is available now through the usual channels; it bundles a servicing stack refresh, fixes, and AI component bits for Copilot+ devices while re‑emphasizing Microsoft’s critical Secure Boot certificate rollover timeline. Organizations and individual users should prioritize staged testing, OEM firmware validation, and adoption of Microsoft’s recommended readiness steps — especially for Secure Boot — to ensure a seamless, secure transition ahead of the June 2026 certificate expirations. (support.microsoft.com, techcommunity.microsoft.com)
Source: Microsoft - Message Center August 12, 2025—KB5063878 (OS Build 26100.4946) - Microsoft Support
Background / Overview
Windows’ monthly cumulative update model bundles quality and security fixes together so that devices receive a compact, single maintenance package. Since Microsoft began combining the servicing stack update (SSU) with the latest cumulative update (LCU) for Windows 11, administrators now typically apply a single combined package that contains both the servicing stack improvements and the security/quality fixes themselves. The servicing stack is the OS component that installs updates; keeping it current is essential because outdated servicing stacks can cause update failures or even boot problems in rare states. Microsoft’s SSU guidance explains why SSUs exist, that SSUs should precede LCUs when installed separately, and why SSUs are effectively non-removable once applied. (support.microsoft.com)This August release follows that model: the bundled package for Windows 11, version 24H2 updates the servicing stack and installs the cumulative fixes in one combined operation. The KB entry supplied with the update lists the build number, the AI component versions included (for Copilot+ PCs), and typical deployment options: Windows Update, Windows Update for Business, WSUS, and the Microsoft Update Catalog for standalone MSU packages. Deployment notes and DISM / Add‑WindowsPackage examples are included for air‑gapped or manually managed fleets.
What’s in KB5063878 (OS Build 26100.4946)
Security and quality highlights
- The update addresses multiple security issues and contains the quality improvements shipped in the prior July package. The KB summary points to the Security Update Guide and the August 2025 Security Updates for CVE details (the KB itself provides a high‑level description of the fix types rather than enumerating every CVE). Administrators who require CVE-level detail should consult the Security Update Guide and map CVEs to their environment’s assets.
- One notable functional fix called out in the release is an authentication improvement: Microsoft states that this update resolves a delay experienced during sign-in on new devices caused by certain preinstalled packages. That’s a user-facing fix with straightforward impact for devices being initialized or for newly provisioned hardware.
AI component updates (Copilot+ devices only)
This release updates a set of AI components used by Windows’ Copilot and AI experiences. The KB lists the following component versions:- Image Search — 1.2507.793.0
- Content Extraction — 1.2507.793.0
- Semantic Analysis — 1.2507.793.0
- Settings Model — 1.2507.793.0
Servicing stack update
Bundled with KB5063878 is the servicing stack update KB5065381 (version 26100.4933). The KB explains that the SSU includes quality improvements for the update pipeline and is included to maintain a robust update experience. As with all SSUs, once installed the servicing stack cannot be uninstalled independently of the OS image; rollback options are limited and generally require system restore or a full image revert. Administrators should plan for that reality when validating monthly packages. (support.microsoft.com)Known issues
Microsoft states that, at the time of publication, it is “not currently aware of any issues” with this update. That is Microsoft’s initial status; organizations that run large or heterogeneous fleets should still test the update in a controlled stage before broad deployment, because real-world interactions with drivers, firmware, or specialty software sometimes reveal issues after rollout.The Secure Boot certificate expiration: What you need to know
The problem and timeline
Microsoft has been clear: several Microsoft certificates that underpin UEFI Secure Boot are set to begin expiring in June 2026, and a second expiration window follows in October 2026 for other certificate components. If devices retain the legacy 2011 CA certificates beyond their expiry, they will cease to accept updates signed by the newer 2023 CAs, and, crucially, they may no longer receive security fixes for pre‑boot components such as Windows Boot Manager. That would degrade the integrity of the boot chain and could prevent distribution of Secure Boot updates. (support.microsoft.com, techcommunity.microsoft.com)Which certificates and dates (high level)
- Microsoft Corporation KEK CA 2011 — expiration: June 2026 — replacement: Microsoft Corporation KEK CA 2023 (stored in KEK).
- Microsoft UEFI CA 2011 and Microsoft Option ROM CA 2011 — expiration: June 2026 — replacements: Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 (stored in DB).
- Microsoft Windows Production PCA 2011 — expiration: October 2026 — replacement: Windows UEFI CA 2023. (support.microsoft.com)
Who is affected
- Broadly: physical and virtual Windows machines (client and server families) manufactured since 2012 that have the legacy 2011 certificate chain present in UEFI Secure Boot variables. Virtual machines that rely on the host firmware can also be affected. Microsoft’s guidance emphasizes that both home users and organizations must take different actions depending on management models (Microsoft-managed updates vs. IT-managed environments). (techcommunity.microsoft.com, support.microsoft.com)
Microsoft’s recommended actions (summary)
- Allow Microsoft to manage Secure Boot certificate updates where feasible: Microsoft will roll new certificates via Windows Update for most consumer and many enterprise devices, reducing manual effort. For Microsoft-managed update scenarios, the company suggests opting in by ensuring the device is receiving Windows Update and, in some cases, enabling diagnostic telemetry that supports the automated update process. (support.microsoft.com)
- For IT-managed devices, coordinate with OEMs to confirm firmware support and deploy OEM firmware updates before applying certificate updates. OEM firmware is the foundation for applying new Secure Boot variables. (techcommunity.microsoft.com)
- Use the registry opt‑in if required for managed rollouts: Microsoft published guidance to set the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot\MicrosoftUpdateManagedOptIn DWORD to 0x5944 to indicate devices may be updated by Microsoft for Secure Boot-related changes; consult organizational policy before changing telemetry or registry settings. Air‑gapped or highly restricted environments require bespoke offline procedures and close OEM coordination. (techcommunity.microsoft.com, support.microsoft.com)
Consequences of inaction
If a device remains on expired or soon‑to‑expire certificates it risks:- Not receiving Secure Boot-related updates after June/October 2026.
- Losing trust for boot components signed by the new CA, which can block newly signed boot loaders or option ROMs.
- Potential vulnerability to boot-level attacks if older signing chains are no longer maintained. (support.microsoft.com, techcommunity.microsoft.com)
Deployment and testing: practical guidance
Quick checklist for admins (high‑priority)
- Inventory and classify devices by management model: Microsoft‑managed updates; WSUS/ConfigMgr; air‑gapped.
- Verify Secure Boot state on representative hardware: Run msinfo32 and confirm Secure Boot State = On. If Secure Boot is disabled, that device will not receive the Secure Boot variable update.
- Coordinate with OEM support: confirm firmware versions that enable the new KEK/DB updates and apply firmware updates before certificate changes are pushed.
- Stage the KB in a test pool: install KB5063878 in a controlled test ring and validate boot flow, drivers, and key business apps.
- Monitor Windows Health Dashboard and the Secure Boot certificate rollout landing page for live telemetry and advisories. (techcommunity.microsoft.com)
How to install the update (supported paths)
- Automatic rollout (recommended for most users): Windows Update / Microsoft Update will deliver the combined SSU + LCU. For most devices that receive Microsoft-managed updates, this is the least friction method.
- Windows Update for Business: honors configured deployment rings and policies; deploy per organizational cadence.
- WSUS / Configuration Manager: sync the update with Product=Windows 11 and Classification=Security Updates.
- Manual / offline installs (air‑gapped or advanced admin scenarios): download MSU files from the Microsoft Update Catalog and install using DISM or Add‑WindowsPackage. Example command lines provided in the KB:
- DISM /Online /Add-Package /PackagePath:c:\packages\Windows11.0-KB5063878-x64.msu
- PowerShell: Add-WindowsPackage -Online -PackagePath "c:\packages\Windows11.0-KB5063878-x64.msu"
These methods work well for image servicing and for updating installation media with dynamic updates but require careful ordering when multiple prerequisite MSU files exist.
Staging recommendations (phased rollout)
- Pilot group: small set of representative devices covering OEM models and critical apps.
- Broad pre-production: expand to a few percent of fleet; monitor update telemetry, event logs, and user feedback.
- Full production: staggered rollout with rollback playbooks and backups.
- Post‑rollout audit: validate Secure Boot variables, check Windows Update health, and verify that Copilot+ AI components installed only where expected.
Risks, strengths, and critical analysis
Strengths in Microsoft’s approach
- Transparent advance notice for Secure Boot certificates. Microsoft published timeline details and published guidance months ahead of the June/October 2026 expirations, giving IT teams and OEMs time to prepare. That transparency reduces the risk of a surprise boot‑impacting event if organizations follow the guidance. (support.microsoft.com, techcommunity.microsoft.com)
- Bundled SSU + LCU reduces dependency errors. Shipping the servicing stack update together with the cumulative update simplifies deployment for many organizations and reduces the chance of missing a critical servicing stack fix that can break update delivery. Microsoft’s SSU FAQ documents the rationale and practical implications of SSUs. (support.microsoft.com)
- Selective rollout for AI components (Copilot+ only). By packaging AI binaries but restricting installs to Copilot+ certified systems, Microsoft can iterate AI functionality while limiting exposure to devices that lack specific NPUs or hardware guarantees. This measured approach limits compatibility surprises for the broader Windows population.
Risks and potential problems
- Complexity for air‑gapped and OEM‑dependent environments. Organizations that do not allow Microsoft-managed updates or that run heavily controlled firmware baselines will need precise, manual certificate injection workflows and OEM coordination. Those processes are error‑prone without a strict, documented rollout plan. (techcommunity.microsoft.com)
- Limited rollback options. Because SSUs are effectively non‑removable and combined update packages change the rollback story, administrators must have strong staging, backups, and recovery procedures. A failed update on a critical system may require image restoration rather than a simple uninstall. (support.microsoft.com)
- Increased attack surface from AI components (theoretical). Tighter OS‑level integration of semantic analysis and extraction engines delivers value, but any large platform component that parses content and handles telemetry increases the potential attack surface and raises privacy questions. The short‑term mitigation is the restricted install model for Copilot+ devices, but long‑term risk management requires continued scrutiny of telemetry, sandboxing (VBS / TPM usage), and explicit admin controls. (windowscentral.com)
- Operational churn from prior 24H2 stability reports. While this KB reports no known issues at publication, past update cycles for Windows 11 24H2 included a variety of hardware‑specific problems (driver and compatibility issues reported by users in the field). Organizations should treat the “no known issues” statement as a starting point — not proof of zero risk — and enforce a conservative test rollout policy. Independent community reports and vendor advisories remain useful early indicators. (windowscentral.com, reddit.com)
Cross‑verification and verification gaps
- The KB text supplied with the update provides the LCU and SSU details, AI component versions, and high‑level guidance for deployment and rollback. For Secure Boot certificate timelines and the recommended opt‑in mechanism, Microsoft’s Windows Secure Boot certificate expiration and CA updates support page and the Windows IT Pro blog corroborate the critical dates and the recommended preparatory actions. Those Microsoft properties constitute two independent, authoritative sources that confirm the timeline and actions. (support.microsoft.com, techcommunity.microsoft.com)
- Unverifiable or incomplete claims: the KB entry summarizes “security issues addressed” but does not list every CVE in the KB body. Administrators requiring explicit CVE mapping must consult the Security Update Guide for the canonical per‑CVE data; the KB alone is insufficient for CVE‑level triage. Treat the KB as the authoritative package manifest and use the Security Update Guide to enumerate vulnerabilities and severity.
Action plan — concise steps for different audiences
For home users and small business (non‑IT managed)
- Enable automatic Windows Update and ensure Secure Boot remains enabled (run msinfo32 to confirm). If the machine is eligible for automatic Microsoft‑managed updates, Microsoft will deliver the new Secure Boot certificates over time. (support.microsoft.com)
- Install KB5063878 when offered; an automatic Windows Update install will typically handle the SSU+LCU together. Back up essential data before applying system updates as a precaution.
For enterprise IT administrators
- Inventory: identify devices with Secure Boot enabled and classify by OEM/BIOS version and update management model.
- OEM coordination: contact major OEMs to confirm firmware updates that support the 2023 KEK/DB changes; schedule firmware updates before certificate updates. (techcommunity.microsoft.com)
- Test KB5063878 in a representative pilot ring (drivers, imaging, and critical LOB apps). Use the MSU offline workflow only when necessary and confirm package order for DISM deployments.
- Opt‑in policy decisions: determine whether Microsoft should manage Secure Boot updates or whether the organization will perform certificate updates manually (set registry key where appropriate and document the approach). (techcommunity.microsoft.com)
- Monitor telemetry and the Windows Health Dashboard post‑deployment. Maintain a rollback and recovery plan (image restore or system restore points) should unexpected failures occur. (support.microsoft.com)
For firmware and device OEM partners
- Continue to publish and signal UEFI firmware updates that allow Secure Boot variable changes, and coordinate with Microsoft for testing firmware + certificate rollout scenarios. The OEM layer matters because Secure Boot variables are stored and managed in firmware; without compatible firmware the OS-level update cannot complete successfully. (techcommunity.microsoft.com)
Final assessment
August’s KB5063878 is a routine monthly delivery in form but strategically significant because it is accompanied by a clear, repeated warning about the Secure Boot certificate expirations that begin in June 2026. The technical changes in this release — an authentication sign‑in delay fix, updated AI binaries for Copilot+ hardware, and an SSU refresh — are what one would expect in a mature platform cadence: incremental quality and security work with selective feature rollouts.The update’s strengths lie in Microsoft’s early notice and documented deployment options: the company has published actionable guidance that, if followed, should let most organizations and consumers transition without disruption. The major operational hazard is not the KB itself but the certificate rollover timeline: mismanaged fleets, unpatched firmware, or air‑gapped systems could see real impacts to secure boot trust and future boot‑time updateability if they do not act. In short: apply testing discipline now, coordinate with OEMs, and treat the June/October 2026 Secure Boot deadlines as immovable milestones in your update calendar. (support.microsoft.com, techcommunity.microsoft.com)
Conclusion
KB5063878 (OS Build 26100.4946) is available now through the usual channels; it bundles a servicing stack refresh, fixes, and AI component bits for Copilot+ devices while re‑emphasizing Microsoft’s critical Secure Boot certificate rollover timeline. Organizations and individual users should prioritize staged testing, OEM firmware validation, and adoption of Microsoft’s recommended readiness steps — especially for Secure Boot — to ensure a seamless, secure transition ahead of the June 2026 certificate expirations. (support.microsoft.com, techcommunity.microsoft.com)
Source: Microsoft - Message Center August 12, 2025—KB5063878 (OS Build 26100.4946) - Microsoft Support