Microsoft has shipped the August 12, 2025 cumulative security update for Windows 11, version 24H2 (KB5063878, OS Build 26100.4946), a routine Patch Tuesday release that combines the latest servicing stack update with the monthly cumulative update, patches a range of security issues, and contains targeted fixes and AI-component refreshes — while also reiterating a high-priority warning about Secure Boot certificate expiry that every IT team should treat as a near-term operational imperative. (support.microsoft.com)
This August update is a combined package: it ships the latest LCU (Latest Cumulative Update) with the latest SSU (Servicing Stack Update) to reduce installation failures and simplify deployment. Microsoft notes that security fixes and quality improvements included here build on the earlier July preview fixes (notably KB5062660), and that devices which already installed prior updates will only download the delta contained in this release. The combined package model is the same release strategy used in recent Windows servicing, intended to make monthly patching more reliable for both consumer and enterprise environments.
Key technical identifiers for administrators:
Why this matters:
Practical implications:
Operational note:
Source: Microsoft - Message Center August 12, 2025—KB5063878 (OS Build 26100.4946) - Microsoft Support
Background / Overview
This August update is a combined package: it ships the latest LCU (Latest Cumulative Update) with the latest SSU (Servicing Stack Update) to reduce installation failures and simplify deployment. Microsoft notes that security fixes and quality improvements included here build on the earlier July preview fixes (notably KB5062660), and that devices which already installed prior updates will only download the delta contained in this release. The combined package model is the same release strategy used in recent Windows servicing, intended to make monthly patching more reliable for both consumer and enterprise environments.Key technical identifiers for administrators:
- KB: KB5063878
- OS Build: 26100.4946
- Applies to: Windows 11, version 24H2 (all editions)
- Release date: August 12, 2025
- Included SSU: KB5065381 (OS Build 26100.4933) — the SSU is bundled to ensure the servicing stack used to apply updates is up to date.
What’s in KB5063878 — high-level summary
Microsoft’s summary for the August package emphasizes three broad areas:- Security fixes across the OS to remediate vulnerabilities discovered or reported since the previous monthly update. The official KB lists the security work as the primary reason to deploy.
- Quality and reliability improvements that continue to address stability regressions reported in prior updates — examples include sign-in delays tied to preinstalled packages and various reliability tweaks rolled forward from the July preview (KB5062660).
- AI component updates packaged with the LCU for components such as Image Search, Content Extraction, Semantic Analysis, and Settings Model (version 1.2507.793.0 in this release). These component updates are included in the cumulative package but are only applicable to Copilot+ PCs and will not install on general Windows PC or Windows Server SKUs. Administrators should note the conditional applicability when auditing update deployments.
The Secure Boot certificate expiration — what’s changing and why it matters
Arguably the most consequential advisory bundled with this release is the urgent reminder about the Secure Boot certificate expiration tied to certificates issued in 2011 that will begin expiring in June 2026. Microsoft has been publishing guidance and a coordinated rollout plan to replace 2011-era certificates with 2023 certificates (KEK and DB updates). Without the new certificates installed, affected devices could lose the ability to receive Secure Boot pre-boot fixes and, in some cases, could fail to boot securely. Microsoft’s advisory explains the scope, recommended actions, and the potential consequences if organizations do nothing. (support.microsoft.com, techcommunity.microsoft.com)Why this matters:
- Secure Boot is a firmware-level trust mechanism that prevents unauthorized low-level code (bootkits, unsigned bootloaders) from loading during the platform startup sequence.
- The signing certificates that underpin Secure Boot trust chains have finite lifetimes; several core Microsoft CA certificates created in 2011 are reaching end-of-life starting in mid‑2026.
- If new 2023 certificates are not present in the platform KEK/DB, devices may be unable to apply pre-boot security updates or may stop trusting new, legitimately signed boot components — a situation with potential availability and security impacts. (support.microsoft.com, techcommunity.microsoft.com)
What Microsoft recommends — practical steps
Microsoft’s published guidance for Secure Boot certificate transition outlines multiple practical options depending on your device management model:- For most consumer devices and many MDM-managed systems, Microsoft will deliver the new 2023 certificates through regular Windows Update channels. No manual action is required for most users if devices are kept current. (support.microsoft.com)
- Enterprise administrators who manage updates themselves via WSUS, SCCM, or other on-prem tools should review Microsoft’s guidance and ensure their update pipelines will include the certificate updates. OEM firmware updates should be applied before certificate changes where required. (techcommunity.microsoft.com, support.microsoft.com)
- Microsoft published an optional registry-based approach to opt into Microsoft-managed Secure Boot updates for organizations that need it (registry value: MicrosoftUpdateManagedOptIn). IT teams should weigh privacy and telemetry implications before toggling this key and follow the official guidance step-by-step. (techcommunity.microsoft.com)
AI components and Copilot+ exclusivity — what admins should know
KB5063878 updates several AI component binaries (Image Search, Content Extraction, Semantic Analysis, Settings Model) to build 1.2507.793.0. These files are distributed with the cumulative update but Microsoft makes it explicit: the AI component updates only install on Windows Copilot+ PCs and will not install on standard Windows PC or Windows Server images. That distinction matters for inventorying update applicability and for any compliance or auditing processes that track installed components across a device estate.Practical implications:
- If your environment includes Copilot+ hardware (selected OEM devices with specific silicon and feature enablement), ensure drivers and OEM-provided firmware are current to receive the full AI feature set.
- Non-Copilot devices will receive the security and quality fixes in the LCU but will not receive the AI component payload. Do not interpret missing AI binaries as an update failure in standard Windows images.
Servicing Stack Update (SSU) — why it matters and how it’s packaged
This release bundles KB5065381 (SSU) at build 26100.4933 with the LCU. SSUs are small but important: they update the component responsible for applying updates and can prevent installation failures, broken rollbacks, and servicing corruption. Microsoft’s best practice is to install SSUs before LCUs where a manual sequence is required; when they’re bundled as a combined package (as in this release), that complexity is handled for you — but administrators still need to be aware that the combined package cannot be rolled back by wusa.exe (because the SSU cannot be removed after installation).Operational note:
- If you need to remove the LCU after installing the combined package, you must use DISM with the LCU package name (DISM /online /get-packages to identify the package, then DISM /online /Remove-Package /PackageName:<name>). Running wusa.exe /uninstall on the combined package will not remove the SSU.
How to get and install KB5063878 — methods and commands
Microsoft documents multiple installation methods for administrators and end users. Core options:- Windows Update and Windows Update for Business: automatic distribution according to policy.
- WSUS: the update will sync automatically if Products = "Windows 11" and Classification = "Security Updates".
- Microsoft Update Catalog: download MSU files for manual or offline installations.
- DISM / Add-WindowsPackage or Add-WindowsPackage for offline images.
- Using DISM:
DISM /Online /Add-Package /PackagePath:c:\packages\Windows11.0-KB5063878-x64.msu - Using PowerShell:
Add-WindowsPackage -Online -PackagePath "c:\packages\Windows11.0-KB5063878-x64.msu" - For offline images:
DISM /Image:mountdir /Add-Package /PackagePath:"Windows11.0-KB5063878-x64.msu"
Add-WindowsPackage -Path "c:\offline" -PackagePath "Windows11.0-KB5063878-x64.msu" -PreventPending
Enterprise deployment considerations and checklist
Deploying this August update at scale should follow disciplined change-control steps. Recommended checklist:- Inventory and classify endpoints by Secure Boot status, firmware age, and Copilot+ capability.
- Validate OEM firmware availability and apply necessary UEFI updates to devices that require updated KEK/DB handling before certificate rollout. (techcommunity.microsoft.com)
- Stage KB5063878 in a controlled pilot ring; monitor Event Viewer, Windows Update logs, and application compatibility telemetry for 72–120 hours.
- Confirm SSU presence (KB5065381) in test images and understand rollback constraints (SSU cannot be uninstalled).
- For WSUS/SCCM environments, ensure Products and Classifications are set correctly to sync the update automatically.
- Document and script DISM-based offline servicing practices for gold images and WinRE updates where necessary.
- If you manage policy-driven Secure Boot transitions, review Microsoft guidance for Group Policy or registry approaches (for opt-in flows) and test thoroughly. (techcommunity.microsoft.com)
Risks, edge cases, and known unknowns
This update appears to be a standard cumulative release, but real-world deployments always reveal edge cases. Key concerns:- Firmware lag: OEMs that do not publish timely firmware updates to accommodate the new 2023 certificates may leave devices in a partially compatible state. This can cause Secure Boot issues or unexpected boot-time behavior on affected devices. (techcommunity.microsoft.com, tomshardware.com)
- Dual-boot and Linux users: reliance on Microsoft-signed shims and bootloaders means Linux compatibility could be affected if firmware does not accept the 2023 certs. Plan for distribution-specific mitigations. (tomshardware.com)
- Telemetry/regulatory considerations: enabling Microsoft-managed Secure Boot updates (opt-in registry key) implies a diagnostic data configuration that enterprises may need to reconcile with internal privacy or regulatory policies. (techcommunity.microsoft.com)
- Unclear consumer guidance: while Microsoft intends to manage much of the rollout automatically for Home/Pro devices, some consumer devices with nonstandard firmware may require manual intervention — and public-facing step-by-step instructions can be dense and technical for average users.
Recommended immediate actions (concise)
- Apply KB5063878 to test devices within 24–72 hours and expand to pilot rings if no regressions appear.
- Inventory firmware versions and coordinate with OEMs to ensure UEFI updates are available where required prior to the Secure Boot certificate transition. (techcommunity.microsoft.com)
- For mixed-OS environments, validate dual-boot and Linux boot workflows on representative hardware. (tomshardware.com)
- For managed fleets, confirm WSUS/SCCM sync settings (Product = Windows 11; Classification = Security Updates) and ensure the SSU/LCU combined package is tested.
- Document rollback and incident response steps, and prioritize critical assets for immediate patching.
Final assessment — strengths and cautions
Strengths:- The combined SSU + LCU delivery reduces a common class of update failures and simplifies deployment workflows for administrators.
- Microsoft’s proactive and public timetable for the Secure Boot certificate transition gives organizations the lead time (June 2026 deadline) needed to plan remediation and avoid service-impacting surprises. (support.microsoft.com, techcommunity.microsoft.com)
- Including AI component updates for Copilot+ devices reflects Microsoft’s staged approach to feature rollouts while keeping core security fixes universal.
- The certificate rollout introduces nontrivial operational complexity that reaches beyond Windows Update: it intersects with OEM firmware, group policy, and system provisioning workflows. Failure to coordinate those elements can produce availability risks, especially at scale. (techcommunity.microsoft.com, tomshardware.com)
- For heterogeneous estates running alternative OSes or custom boot chains, the certificate change will likely require targeted testing and, in some cases, bespoke remediation steps.
Conclusion
KB5063878 (OS Build 26100.4946) is a routine but important August cumulative update that bundles security fixes, quality improvements, and AI component updates while reiterating an urgent, broader ecosystem advisory about Secure Boot certificate expiration beginning in June 2026. For home users who keep automatic updates enabled, this patch will install via Windows Update with minimal action required; for IT professionals and enterprises, the month’s real work is preparation — inventory firmware, coordinate with OEMs, stage the combined SSU+LCU in controlled rings, and validate Secure Boot behavior across diverse device types. The technical window before June 2026 is finite; organizations that treat the Secure Boot certificate transition as an item on their patch-and-firmware roadmap today will avoid urgent, disruptive remediation later.Source: Microsoft - Message Center August 12, 2025—KB5063878 (OS Build 26100.4946) - Microsoft Support