Windows 11 Glitches, VMware Fixes, and DES Removal: A Roundup of Latest Windows News
Windows users know that staying on top of updates is a double-edged sword—on one hand, the promise of enhanced security and new features; on the other, unexpected bugs that can disrupt everyday tasks. Today’s roundup covers three major developments affecting Windows 11 environments: troubleshooting a problematic update impacting File Explorer, a vital VMware Workstation Pro update addressing host freezing and boot crashes, and Microsoft’s forward-thinking move to phase out outdated DES encryption in future updates.File Explorer Troubles on Windows 11: When a Security Update Backfires
A new mandatory update, designated KB5051987, has stirred up dissatisfaction among Windows 11 users. Following its installation, many have reported that File Explorer—a core tool for navigating files and folders—exhibits significant performance issues. Users have experienced non-responsive behavior when trying to open familiar directories like Desktop, Documents, or Pictures. Additionally, the File Explorer sidebar, which traditionally offers quick access to essential folders, is only partially functional; notably, only the Home and Gallery folders remain accessible, leaving other navigation options in limbo.What’s Happening?
- User Reports: After the KB5051987 update, File Explorer starts normally as evidenced by its presence in the Task Manager, but the user interface itself becomes uncooperative.
- Sidebar Glitches: The sidebar fails to load several important folders, restricting access and productivity.
- Temporary Workaround: For those facing these issues, the immediate remedy is to manually uninstall the update. This can be done via the Windows Update section within Settings. Users are advised to navigate to the update history, select KB5051987, and click “Uninstall.”
Steps to Uninstall the Update
- Open Settings: Click on the Start menu and select Settings.
- Navigate to Windows Update: In the Settings menu, choose Windows Update.
- Access Update History: Find the update history, where KB5051987 will be listed.
- Uninstall the Update: Click the “Uninstall” button next to KB5051987 and confirm your action.
- Reboot Your System: After uninstallation, restart your PC to revert to the previous stable update (often referred to as the January 2025 Update).
Broader Implications
This incident illustrates the challenges inherent in the modern update ecosystem. With essential security patches sometimes triggering operational glitches, users and IT administrators alike must stay vigilant and be prepared to roll back problematic updates swiftly. Moreover, as organizations increasingly rely on automated update processes, ensuring a seamless balance between security enhancements and system stability becomes ever more critical.In summary: If you’re a Windows 11 user facing issues with File Explorer after a recent update, a quick uninstallation might serve as an effective interim solution. However, a more permanent fix is on the horizon, so watch for the optional February update.
VMware Workstation Pro Update: Fixes for Freezing, Boot Crashes, and Security Vulnerabilities
For professionals using virtualization on Windows 11, stability is paramount. VMware Workstation Pro, a tool that has become indispensable in many IT environments, recently rolled out version 17.6.3—a comprehensive update addressing a range of issues that have plagued Windows 11 hosts.Key Fixes in Version 17.6.3
- System Unresponsiveness: A critical issue where Windows 11 hosts would freeze after certain user actions or during extended usage has been addressed, ensuring smoother operations.
- Boot Crash Bugs: For some users, booting up virtual machines resulted in unexpected crashes. This bug has been resolved, providing a more reliable start-up process.
- Security Vulnerabilities: The update repairs important TOCTOU (Time-of-Check Time-of-Use) vulnerabilities marked by security identifiers CVE-2025-22224 and CVE-2025-22225 (with some sources also referencing a close variation of these IDs). These vulnerabilities, if exploited, could allow malicious code execution resulting in out-of-bound memory writes.
- Additional Fixes: Minor improvements include resolving a compilation error on Centos 9 Stream hosts with newer kernel versions and addressing known issues related to multi-monitor configurations.
A New Era of Freemium Licensing
Perhaps one of the more exciting announcements is that VMware Workstation Pro no longer requires a license key. It is now available for free—covering commercial, educational, and personal uses. This move democratizes access to high-end virtualization technology, broadening its potential use in learning environments and by businesses seeking cost-effective solutions.What This Means for Users
- Improved Stability on Windows 11 Hosts: If you rely on virtualization environments for development, testing, or educational purposes, this update should significantly reduce the frustration of system freezes and unexpected crashes.
- Enhanced Security: Addressing the TOCTOU vulnerabilities not only prevents potential security breaches but also reinforces the trust in the virtualization layer—crucial when deploying virtual machines in production environments.
- No More License Key Hassles: By eliminating the need for a license key, VMware makes its high-performance tool accessible to a wider audience, lowering the barrier for small businesses and individual professionals.
Microsoft’s Bold Move: Removing DES Encryption for a Secure Future
In a proactive stride to fortify system security, Microsoft is set to remove the outdated Data Encryption Standard (DES) encryption algorithm from its Kerberos authentication protocol in Windows 11 version 24H2 and Windows Server 2025. This measure will cement the transition to more robust encryption methodologies essential for maintaining cybersecurity in an era of advanced threats.Why Remove DES?
- Outdated Technology: DES, established in 1977, uses a 56-bit key that is considered vulnerable by today’s standards. With modern computational capabilities, brute force and known-plaintext attacks can render DES easily compromised.
- Legacy Support vs. Modern Practices: Although DES has been disabled by default on systems since Windows 7 and Windows Server 2008 R2, it lingered on as an optional component for legacy compatibility. The upcoming changes mark the end of that compatibility era.
- Compliance and Best Practices: With the push towards adherence to higher standards, such as those prescribed by the Federal Information Processing Standards (FIPS), transitioning entirely to Advanced Encryption Standard (AES) and other secure ciphers is a strategic necessity.
Implementation Timeline and Recommendations
- Effective Date: The removal will take effect with updates released on or after September 9, 2025.
- Phased Rollout: The deprecation of DES will occur in phases to minimize disruption and allow IT administrators adequate time for remediation.
- Action Items for Administrators:
- Detect DES Usage: Use PowerShell scripts and monitor Kerberos Key Distribution Service (KDCSVC) Event IDs (4768 and 4769) to identify any accounts or applications relying on DES.
- Update Configurations: Revise Active Directory settings and enforce strong encryption by modifying Group Policy to restrict encryption to AES-based methods.
- Testing: Carefully test new configurations in a controlled environment to guarantee that domain trusts and third-party systems remain compatible before full deployment.
Security and Operational Implications
- Enhanced Cybersecurity: Removing an outdated cipher like DES helps in reducing potential attack vectors, thus fortifying enterprise networks against increasingly sophisticated cyber threats.
- Long-term Investment in Security: While the change might require some initial effort in terms of system audits and configuration updates, the long-term benefits—reduced vulnerability and improved compliance—far outweigh the short-term adjustments.
- Industry-Wide Impact: Organizations not only using Windows systems but also running mixed environments may find that this transition accelerates the adoption of modern security practices industry-wide.
Conclusion: Navigating the Dual Realities of Update Pains and Security Gains
The diversity of news covered in today’s roundup reflects the multifaceted challenges and opportunities facing Windows environments:- System Stability vs. Mandatory Updates: The File Explorer issues stemming from KB5051987 remind us that even essential security updates can inadvertently undermine functionality, prompting immediate remedial action and the need for cautious update management.
- Virtualization Enhancements: The release of VMware Workstation Pro 17.6.3 not only boosts stability and security on Windows 11 hosts but also streamlines access through its new licensing model, enhancing productivity for developers and IT professionals.
- Legacy Protocol Phase-Out: Microsoft’s structured plan to remove DES encryption underscores a broader commitment to future-proofing Windows security. By phasing out obsolete protocols, Microsoft is paving the way for more secure and resilient systems.
In a world where the tension between cutting-edge innovation and legacy compatibility is ever-present, these updates serve as a vital reminder of the importance of adaptability and proactive management. Whether you’re troubleshooting File Explorer glitches, updating your virtualization software, or reconfiguring encryption settings, keeping abreast of the latest developments will empower you to navigate the dynamic landscape of Windows technology with confidence.
Stay tuned to WindowsForum.com for further in-depth coverage, expert tips, and community discussions as these stories evolve and impact the broader IT ecosystem.
Embrace the future of Windows—secure, efficient, and continuously evolving.
Sources: