Microsoft has confirmed that the August Patch Tuesday cumulative updates introduced a regression that can break Windows’ built‑in reset and recovery flows on a wide range of supported client releases, and an out‑of‑band (OOB) emergency patch is being prepared to fix the problem before the next scheduled Patch Tuesday on September 9, 2025. (neowin.net, support.microsoft.com)
Windows receives monthly cumulative security and quality updates on “Patch Tuesday,” a cadence Microsoft has used for years to deliver fixes and mitigations across Windows client and server editions. Those cumulative updates often include a combination of a servicing stack update (SSU) and a latest cumulative update (LCU), and they are meant to be safe, backward‑compatible maintenance releases. Unfortunately, the complexity of that packaging and the breadth of hardware and OEM customizations means regressions occasionally slip through, with outsized effects on recovery tooling that users rely on when things go wrong.
The affected features in this incident are central to system recovery:
Affected client versions reported by Microsoft and multiple industry outlets include:
Microsoft’s statement also says the company is preparing an out‑of‑band (OOB) update — an emergency servicing release published outside the usual monthly cycle — and that it expects to deliver the fix “in the coming days,” before the next Patch Tuesday on September 9, 2025. Until that fix is available, Microsoft recommends avoiding using the affected reset and recovery options on impacted builds. (neowin.net, theregister.com)
From a consumer perspective, the danger is that a user may attempt a Reset expecting files to be preserved and the device to recover, only to have the operation fail and roll back — leaving them no further forward and possibly with a partially altered system state. For administrators, the inability to perform remote wipes or automated cloud recovery increases the operational cost of incident response.
For users and administrators, the correct posture is conservative: back up, avoid the affected recovery operations, and prepare to apply the emergency OOB fix once Microsoft releases it. In the meantime, keep recovery media and manual reinstall plans at the ready, and consider strengthening pre‑deployment testing for future cumulative updates to reduce operational disruption.
Microsoft will likely publish the OOB package and follow‑up notes in the coming days; until then, treating reset and recovery options as fragile on impacted builds is the safest course of action. (neowin.net, theregister.com)
Source: Windows Report Microsoft Confirms August Patch Tuesday Updates Trigger Reset & Recovery Failures
Background
Windows receives monthly cumulative security and quality updates on “Patch Tuesday,” a cadence Microsoft has used for years to deliver fixes and mitigations across Windows client and server editions. Those cumulative updates often include a combination of a servicing stack update (SSU) and a latest cumulative update (LCU), and they are meant to be safe, backward‑compatible maintenance releases. Unfortunately, the complexity of that packaging and the breadth of hardware and OEM customizations means regressions occasionally slip through, with outsized effects on recovery tooling that users rely on when things go wrong. The affected features in this incident are central to system recovery:
- Reset this PC — the Settings → System → Recovery flow that lets users reinstall Windows while optionally keeping files.
- Fix problems using Windows Update (the cloud recovery option) — a cloud reinstall path that fetches a fresh image when local repair fails.
- RemoteWipe CSP — the Configuration Service Provider used by management platforms (Intune / Microsoft Endpoint Manager) to remotely wipe or reset devices for redeployment or security reasons. (neowin.net, support.microsoft.com)
Overview of the confirmed impact
Microsoft’s public tracking (the Release Health / message infrastructure and individual KB articles) now lists the issue as Confirmed and identifies a wide but specific set of client builds where reset and recovery operations can fail after installing the August 12, 2025 updates. The primary originating KBs called out in community reporting and Microsoft documentation include KB5063875 and KB5063709 for various client SKUs and builds. (askwoody.com, support.microsoft.com)Affected client versions reported by Microsoft and multiple industry outlets include:
- Windows 11, version 23H2
- Windows 11, version 22H2
- Windows 10, version 22H2
- Windows 10 Enterprise LTSC 2021
- Windows 10 IoT Enterprise LTSC 2021
- Windows 10 Enterprise LTSC 2019
- Windows 10 IoT Enterprise LTSC 2019
Microsoft’s statement also says the company is preparing an out‑of‑band (OOB) update — an emergency servicing release published outside the usual monthly cycle — and that it expects to deliver the fix “in the coming days,” before the next Patch Tuesday on September 9, 2025. Until that fix is available, Microsoft recommends avoiding using the affected reset and recovery options on impacted builds. (neowin.net, theregister.com)
Why this matters: practical risks to users and organisations
A broken Reset or recovery flow is far more than an inconvenience. These features are the last‑resort tools for:- Recovering systems after corruption, malware, or failed upgrades.
- Preparing devices for reassignment, resale, or disposal via a secure wipe.
- Remotely sanitising lost or stolen machines using management platforms that rely on RemoteWipe CSP.
- Allowing non‑technical users to recover from boot or profile failures without IT intervention.
From a consumer perspective, the danger is that a user may attempt a Reset expecting files to be preserved and the device to recover, only to have the operation fail and roll back — leaving them no further forward and possibly with a partially altered system state. For administrators, the inability to perform remote wipes or automated cloud recovery increases the operational cost of incident response.
What Microsoft and community sources have confirmed (technical specifics)
- The August 12, 2025 cumulative updates released on Patch Tuesday carry the originating KB identifiers that map to the affected client builds (for example, KB5063709 for certain Windows 10 builds and KB5063875 for some Windows 11 client branches in community reporting). Those KB pages document the update packages and, in some cases, include notes about combined SSU/LCU packaging and removal constraints.
- Microsoft’s Release Health / message channels and multiple independent outlets (news sites and community forums) report that Microsoft opened an investigation on August 18, 2025 and subsequently marked the issue as Confirmed while preparing an OOB patch. The company’s public guidance is to avoid using Reset, cloud recovery, and RemoteWipe CSP on impacted builds until the fix is published. (askwoody.com, theregister.com)
- Some KB pages reiterate that combined SSU+LCU packages are handled differently than standalone LCUs; the servicing stack changes in those combined packages may affect the ability to uninstall or roll back updates through standard GUI tooling. This complicates simple “uninstall the update” guidance for affected environments and is why Microsoft is prioritising an emergency OOB release rather than relying on users to roll back via normal methods.
Root cause: what’s known and what remains uncertain
At the time of writing Microsoft has not published a detailed postmortem or a precise root‑cause analysis in the public KB text. Community diagnostics and historical patterns suggest a likely regression in one of the following subsystems, but these remain hypotheses until Microsoft releases a technical breakdown:- WinRE / Windows Recovery Environment update or image regression that prevents the recovery OS from launching or performing the reset flow.
- Servicing stack / SSU regression that incorrectly packages or invokes the reset workflow during an in-place cloud install.
- Configuration Service Provider (CSP) behaviour change affecting RemoteWipe’s interaction with MDM protocols.
Historical context: this is not the first time reset flows have regressed
This class of regression is unfortunately not unprecedented. In 2020–2021 Microsoft had to pull and subsequently fix updates that caused the Reset this PC or push‑button reset functionality to fail on legacy releases after a servicing update introduced an incompatibility. Those incidents prompted emergency rollbacks and highlighted how changes to recovery components can have systemic impact across many devices. The recurrence underscores two realities: recovery tooling is delicate, and cumulative updates that touch servicing or WinRE elements carry outsized risk.Mitigation and recommended actions
Microsoft’s immediate public guidance is straightforward: do not use Reset this PC, cloud recovery, or RemoteWipe on affected builds until the OOB fix is installed. Beyond that, administrators and informed users should take these practical steps:- For home users and IT pros — immediate, conservative steps:
- Avoid using Settings → System → Recovery on affected builds. If you need to rescue a failing PC, prefer manual, offline recovery methods (installation media) rather than the broken reset flow.
- Back up critical data immediately (full file copy, disk image, or cloud backup) before attempting any recovery action.
- Create a Windows installation USB using the Media Creation Tool or official ISO so you can perform an offline clean install if recovery fails. Lifewire‑style recovery guides and Microsoft’s own reinstall docs cover these steps. (lifewire.com, support.microsoft.com)
- For enterprises and IT administrators:
- Halt automatic deployment of the August 12 updates to unaffected test devices while the OOB fix is staged. Use WSUS, SCCM/ConfigMgr, or Intune rings to delay or block the affected KBs where practical.
- Prevent remote wipe commands from being issued to devices on impacted builds unless you have an immediate ability to support manual remediation. Review your Intune/MDM policies and consider a temporary hold on automated wipe actions targeted at those OS versions.
- Check for the OOB update and test it in a controlled pilot before broad deployment. Microsoft typically publishes OOB packages via the Update Catalog and Windows Update; coordinate with change windows.
- Maintain offline recovery images and documented manual reinstall procedures for frontline support to minimize downtime while the patch is rolled out.
- On rollback and uninstall strategies:
- Do not assume you can safely uninstall the KB if it’s provided as a combined SSU+LCU package — combined packages may not be removable via normal GUI uninstall pathways, per Microsoft KB guidance. If rollback is necessary, be prepared to use clean media installs or image restore for the worst cases.
- Troubleshooting steps for blocked or corrupted profiles:
- If a user already experiences profile or sign‑in problems after the update, follow Microsoft Q&A guidance for temporary remedies: create a local admin account, copy data from the old profile, or use system restore where available. These are stopgaps; they do not fix the underlying reset regression.
What to expect from Microsoft and how the OOB patch rollout typically works
When a confirmed bug affects recovery flows, Microsoft’s standard playbook is to produce an out‑of‑band cumulative package that corrects the specific regression and publish it via Windows Update and the Microsoft Update Catalog. The patch is usually targeted at the specific affected SKUs and builds, and the company often documents the fix in the Release Health message and in updated KB text. Administrators should expect:- A targeted OOB cumulative update listing the affected KB as the “Originating KB” and a new “Resolved KB” reference.
- A short window between the OOB publication and broader rollout — admins should patch pilot groups first, validate recovery flows, then accelerate deployment.
- Follow‑up notes or a postmortem if the incident affects many customers or has complex side effects. (theregister.com, askwoody.com)
Critical analysis: strengths, weaknesses, and systemic risks
Strengths:- Microsoft’s fast acknowledgement and promise of an OOB patch demonstrates a functioning incident response path and prioritisation of recovery flows. The company’s Release Health apparatus and the ecosystem of community trackers enabled rapid awareness. (askwoody.com, theregister.com)
- The incident once again highlights the fragility of recovery subsystems and the cascading risk that a single regression in servicing code or WinRE can have across millions of endpoints. The inability to safely uninstall combined updates and the resulting reliance on emergency OOB patches increases operational friction for enterprises.
- Communication gaps are apparent: some KB pages initially reported no known issues for given SKUs while the Release Health dashboard showed Confirmed messages for others. That inconsistency can confuse admins and underscores the need for centralized, clearly visible advisories when recovery tooling is at risk. (support.microsoft.com, askwoody.com)
- Organisations that rely on automated remote wipe for security compliance may experience a temporary control gap; this is a non‑trivial compliance and data‑protection risk for regulated industries. Until the OOB patch is deployed, manual processes will be required to meet certain legal or contractual obligations.
Practical checklist for readers (summary of recommended actions)
- Immediately back up essential data from devices that received the August 12 updates.
- Avoid using Settings → System → Recovery on affected builds (Windows 11 23H2/22H2, Windows 10 22H2, LTSC SKUs listed above).
- Create offline installation media now so you can perform a clean install if recovery fails.
- For admins: delay broad deployment of the August updates, hold off remote wipe actions on impacted devices, and prepare to test the OOB fix on a pilot group as soon as Microsoft publishes it.
- Watch Microsoft’s Release Health messages and the Microsoft Update Catalog for the OOB package and its resolved KB reference. Apply the OOB patch promptly once validated.
Closing assessment
The August 2025 Patch Tuesday regression is a timely reminder that updates which affect core recovery and servicing components have an outsized impact when they fail. Microsoft’s decision to prepare and distribute an out‑of‑band patch reflects the severity of the problem, and early public acknowledgement is preferable to prolonged silence. That said, the incident highlights persistent tensions in large‑scale software maintenance: balancing rapid security rollouts against the need for exhaustive cross‑SKU testing for recovery paths.For users and administrators, the correct posture is conservative: back up, avoid the affected recovery operations, and prepare to apply the emergency OOB fix once Microsoft releases it. In the meantime, keep recovery media and manual reinstall plans at the ready, and consider strengthening pre‑deployment testing for future cumulative updates to reduce operational disruption.
Microsoft will likely publish the OOB package and follow‑up notes in the coming days; until then, treating reset and recovery options as fragile on impacted builds is the safest course of action. (neowin.net, theregister.com)
Source: Windows Report Microsoft Confirms August Patch Tuesday Updates Trigger Reset & Recovery Failures