Microsoft has confirmed that the February 2026 Windows 11 cumulative updates include fixes for two troubling post‑patch problems: a graphics‑related system crash tied to dxgmms2.sys that manifested as KERNEL_SECURITY_CHECK_FAILURE BSODs on certain GPU setups, and a separate regression that blocked connections to some WPA3‑Personal Wi‑Fi networks.
Microsoft ships a monthly set of cumulative updates for Windows 11 that bundle security fixes, servicing‑stack improvements and a mix of quality changes. The February 2026 release cycle consolidated earlier January out‑of‑band fixes and added a number of targeted reliability improvements across versions 23H2, 24H2/25H2 and the newer 26H1 build. Among the items called out in the official change logs were a fix for a dxgmms2.sys‑related system error that could cause a KERNEL_SECURITY_CHECK_FAILURE stop code and a networking fix for problems connecting to certain WPA3‑Personal SSIDs.
These are not theoretical bugs: user reports and community threads tracing similar failures go back years in a couple of different forms. One ongoing pattern has been collisions between new kernel‑level Windows protections and third‑party kernel drivers (commonly anti‑cheat or game protection drivers), which have previously produced KERNEL_SECURITY_CHECK_FAILURE or related stop codes when hardware‑enforced mitigations were enabled.
That matters: singling out a vendor publicly when the root cause might be an OS timing or memory handling change risks misattribution and can impede coordinated remediation. Until definitive root cause reports are published by Microsoft or vendors that tie the failures exclusively to a single vendor’s driver, users and admins should treat the issue as configuration‑specific rather than vendor‑specific. Where vendor updates exist, install them; where they don’t, follow the mitigation steps above.
If you were affected, the immediate steps are clear: install February’s cumulative updates, update GPU and wireless drivers from vendor channels, and — if necessary — apply short‑term mitigations (rollback drivers, temporarily switch network encryption modes, or, only as a last resort, disable specific kernel security features after understanding the security trade‑offs). Administrators should pilot these updates before broad deployment and coordinate with hardware vendors for validated driver versions.
The episode is a reminder that as Windows hardens its kernel and expands hardware‑assisted protections, everyone in the ecosystem — Microsoft, GPU and NIC vendors, anti‑cheat and peripheral software publishers, and IT operators — must accelerate compatibility work to avoid putting users between the choice of security and stability.
Source: Windows Latest Microsoft says Windows 11 update causes BSOD on some GPU config, broke WPA3 Wi‑Fi, but a fix is rolling out
Background / Overview
Microsoft ships a monthly set of cumulative updates for Windows 11 that bundle security fixes, servicing‑stack improvements and a mix of quality changes. The February 2026 release cycle consolidated earlier January out‑of‑band fixes and added a number of targeted reliability improvements across versions 23H2, 24H2/25H2 and the newer 26H1 build. Among the items called out in the official change logs were a fix for a dxgmms2.sys‑related system error that could cause a KERNEL_SECURITY_CHECK_FAILURE stop code and a networking fix for problems connecting to certain WPA3‑Personal SSIDs.These are not theoretical bugs: user reports and community threads tracing similar failures go back years in a couple of different forms. One ongoing pattern has been collisions between new kernel‑level Windows protections and third‑party kernel drivers (commonly anti‑cheat or game protection drivers), which have previously produced KERNEL_SECURITY_CHECK_FAILURE or related stop codes when hardware‑enforced mitigations were enabled.
What happened: the graphics BSOD (dxgmms2.sys → KERNEL_SECURITY_CHECK_FAILURE)
Symptom and stop code
Affected users saw a hard system crash — the modernized Windows stop screen — with the stop code KERNEL_SECURITY_CHECK_FAILURE (Bug Check 0x139). In the February update notes Microsoft explicitly linked a recent system error to dxgmms2.sys, the kernel component used by Windows for DirectX graphics memory management. That file is deeply involved in GPU memory and driver interactions, so errors originating here can and do trigger kernel‑level failures.Scope and vendor ambiguity
Microsoft’s update notes describe the problem as occurring on “certain GPU configurations” rather than naming a single GPU vendor. That choice of wording is telling: while many of the loudest reports in late January and early February centered on Nvidia‑equipped machines, Microsoft’s public wording avoids singling out any single GPU maker. This suggests the underlying interaction could involve driver/OS behaviour that affects multiple vendors under specific configurations (driver version, OS build, particular Windows security features enabled, etc.), rather than a simple one‑vendor driver regression. Still, the loud noise in community channels largely came from gamers and high‑performance desktops where heavy GPU use reveals subtle memory‑management races.Why dxgmms2.sys can crash a PC
dxgmms2.sys handles low‑level DirectX graphics memory operations and coordinates with vendor drivers. When a device driver or the OS attempts an invalid memory operation, or when a kernel data structure becomes corrupted or unexpectedly changed, the kernel triggers a fatal stop to prevent further damage — hence KERNEL_SECURITY_CHECK_FAILURE. Fixing this typically requires patching either the OS code paths that mismanage memory or the third‑party driver that violates expected invariants. Microsoft’s February updates include a targeted resolution intended to stop this class of crashes from reoccurring on affected configurations.The WPA3 regression: some networks stopped accepting connections
The regression and its origin
Separately, Microsoft acknowledged that after an optional January preview update (KB5074105) some devices could not connect to certain WPA3‑Personal networks. That regression was explicitly referenced in the February cumulative patches as being addressed. Microsoft’s official notes call it a networking fix that restores connectivity for systems impacted by the January preview.Real‑world reports and vendor forums
Independent reports from hardware vendors and community forums described adapters trying to negotiate WPA3 even when a network was configured for WPA2, or failing to connect to WPA3 networks in mixed‑mode environments. An Intel community thread, for example, described an adapter behavior where a system attempted WPA3 negotiation despite manual WPA2 selection, causing connection failures on networks without WPA3 enabled. Those practical troubleshooting threads helped Microsoft and driver vendors reproduce and scope the problem.Timeline and rollout: patched, but phased
Microsoft’s February 10, 2026 cumulative updates (various KB packages depending on Windows 11 branch) list both the dxgmms2.sys fix and the WPA3‑Personal connectivity fix in their change logs. That means the company has shipped code intended to prevent the kernel error and to restore WPA3 connectivity for impacted clients. However, Microsoft also emphasizes that fixes are being rolled out progressively and that some fixes apply through staged targeting in Windows Update — so individual machines may not immediately show the corrected behaviour even after installing the February package. In practice, that means administrators and users should expect a phased remediation window rather than an instant universal cure.Technical context: why these problems keep happening
Complex interplay: kernel features, drivers and userland
Modern Windows implements a growing set of hardware‑assisted mitigations — Virtualization‑based Security (VBS), Hypervisor‑enforced Code Integrity (HVCI), and Kernel‑mode hardware‑enforced stack protection — all of which change kernel behaviour and driver expectations. Those protections are important for security, but they change assumptions under which many older or tightly obfuscated drivers were written (especially anti‑cheat and some enterprise drivers that embed binary protection layers). When a driver performs operations that were previously tolerated but are now rejected or detected as corrupt by protection mechanisms, the system may refuse to load the driver or — in some cases — fall into a crash path if mismatches occur during runtime. Microsoft documents the kernel‑mode hardware stack protection feature and its incompatibility‑list behaviour in detail.Patch complexity and surface area
Every cumulative update touches many system components. A change intended to harden memory handling or to mitigate a specific race can interact with vendor code paths in surprising ways. GPU drivers are particularly sensitive: they operate in kernel space, move large buffers, and are deeply stateful. Small timing changes in OS scheduling, memory reclamation, or driver load ordering can expose latent bugs in either the OS or drivers. That coupling increases the risk that a broadly distributed update will produce a small but highly visible class of failures on a subset of hardware/software stacks.Risk analysis: strengths and liabilities of Microsoft’s approach
Strengths
- Rapid acknowledgement and targeting. Microsoft publicly listed both the dxgmms2.sys system error and the WPA3 connectivity bug in the February release notes, which is important transparency for sysadmins and end users. Publicly documenting fixes reduces confusion and helps teams decide when and how to update.
- Staged rollout with targeting signals. For changes that affect secure boot or new Secure Boot certificates, Microsoft used phased deployment and update‑signal targeting to reduce the risk of wide‑scale boot problems. The same phased approach helps limit collateral breakage while gathering telemetry.
- Working with vendors. The persistent theme of driver incompatibility has driven closer coordination between Microsoft and driver publishers (GPU vendors, network adapter manufacturers, anti‑cheat vendors), which improves long‑term stability even if short‑term frictions occur.
Liabilities and ongoing risks
- Security vs compatibility trade‑offs. Enabling aggressive kernel protections improves security posture but can break drivers that perform non‑standard kernel operations. In environments where those drivers are required — gaming, legacy enterprise peripherals, or custom embedded solutions — administrators will face a painful choice between protection and functionality. Microsoft and vendors must continue to prioritize driver updates or ship mitigations.
- Phased rollouts can create uneven user experience. When fixes are staged at the backend or targeted by telemetry, some users get a working system faster than others. Consumers and small businesses without deep telemetry insight may still experience breakage or delays in the fix arriving.
- Patch churn and trust erosion. Frequent emergency and corrective updates can reduce confidence among enterprise patch managers, prompting more conservative update policies that in turn delay security improvements. The pattern of out‑of‑band releases in January and subsequent updates in February underscores a tension between speed and QA.
Practical guidance: what to do if you’re affected
Below are pragmatic steps for hobbyists, gamers, and IT professionals to identify, mitigate and resolve these issues while balancing security.Quick checks (immediate triage)
- Check Windows Update for the latest cumulative updates (February 2026 packages). If available, install and reboot. The February updates list the dxgmms2.sys and WPA3 fixes.
- If you experience an immediate BSOD with KERNEL_SECURITY_CHECK_FAILURE after a recent update, note whether the crash occurs during GPU‑intensive scenarios (gaming, video playback) or when a particular application launches. That helps isolate driver involvement.
Short‑term mitigations
- If GPU‑related BSODs continue after installing the February updates:
- Boot into Safe Mode and temporarily roll back the last driver update (use Device Manager to roll back GPU drivers).
- If you use vendor installers (Nvidia/AMD), try a clean driver install using the vendor’s clean install option or a DDU removal followed by a fresh driver. This reduces the chance of driver corruption or conflicting remnants causing trouble.
- Consider connecting to Windows Update and checking for optional driver updates — vendors sometimes push signed driver updates through Microsoft's update pipeline after a patch window.
- If connection to WPA3 networks fails:
- Confirm whether the affected SSID is WPA3‑Personal, WPA2, or mixed mode on the router/AP. If possible, temporarily change the AP to WPA2‑Personal to restore connectivity and buy time. If that’s not possible, update the client’s driver and install the February cumulative patch.
- If a kernel security feature (Kernel‑mode hardware‑enforced stack protection) appears to be blocking a needed driver:
- Review the Windows Security → Device Security → Core isolation → Kernel‑mode Hardware‑enforced Stack Protection controls. Microsoft documents the prerequisites and how incompatible drivers are surfaced. Disabling the feature is possible but reduces protection; consider it only as a last resort and only after ensuring the driver vendor cannot provide an update.
Recommended steps for enterprise administrators
- Test February packages in a small ring first. Use a pilot deployment to validate GPU and networking stacks before broad rollout.
- Require driver validation from hardware vendors, especially for systems running virtualization‑based security and HVCI. Maintain a baseline of approved driver versions.
- For managed Wi‑Fi networks, coordinate with WLAN/AP vendors to ensure WPA3 modes are tested against the latest client drivers and OS builds. If problems are found, consider temporary profile changes to WPA2 until an approved client build is available.
Why some reports singled out Nvidia — and why wording matters
Community reporting often focuses on the most visible player. In this cycle, many crashes were reported on systems with Nvidia GPUs (likely because those machines are common among gamers who stress GPUs heavily). However, Microsoft’s wording deliberately refers to “certain GPU configurations,” not a single vendor, which is a careful legal and technical phrasing that leaves room for driver/OS interactions that could cross vendor boundaries.That matters: singling out a vendor publicly when the root cause might be an OS timing or memory handling change risks misattribution and can impede coordinated remediation. Until definitive root cause reports are published by Microsoft or vendors that tie the failures exclusively to a single vendor’s driver, users and admins should treat the issue as configuration‑specific rather than vendor‑specific. Where vendor updates exist, install them; where they don’t, follow the mitigation steps above.
The broader picture: update hygiene and long‑term fixes
This episode is a useful case study in modern OS maintenance:- Windows continues to accrue protective features that change kernel behaviour; those protections are desirable but increase the testing surface for drivers and firmware. Proper vendor coordination and driver hardening must accelerate to keep pace.
- Staged rollouts and telemetry‑based targeting are essential tools to reduce risk at scale, but they create visibility gaps and uneven user experience. Microsoft and large IT shops must balance telemetry safety checks with transparent communication so admins can make timely decisions.
- For users who rely on sensitive third‑party drivers (anti‑cheat, legacy hardware control, specialized enterprise peripherals), a strict update rollout policy (pilot → broad → deferred) and a controlled driver catalog are critical.
Conclusion
Microsoft has acknowledged and shipped fixes in the February 2026 Windows 11 cumulative updates for two practical, high‑impact regressions: a dxgmms2.sys‑related KERNEL_SECURITY_CHECK_FAILURE on some GPU configurations, and a WPA3‑Personal connectivity regression originating from the January preview. The company’s official change logs make the fixes explicit, but rollout is staggered and remediation may arrive at different times for different devices.If you were affected, the immediate steps are clear: install February’s cumulative updates, update GPU and wireless drivers from vendor channels, and — if necessary — apply short‑term mitigations (rollback drivers, temporarily switch network encryption modes, or, only as a last resort, disable specific kernel security features after understanding the security trade‑offs). Administrators should pilot these updates before broad deployment and coordinate with hardware vendors for validated driver versions.
The episode is a reminder that as Windows hardens its kernel and expands hardware‑assisted protections, everyone in the ecosystem — Microsoft, GPU and NIC vendors, anti‑cheat and peripheral software publishers, and IT operators — must accelerate compatibility work to avoid putting users between the choice of security and stability.
Source: Windows Latest Microsoft says Windows 11 update causes BSOD on some GPU config, broke WPA3 Wi‑Fi, but a fix is rolling out