A Windows 11 security update released in mid‑October 2025 (KB5066835, OS build 26100.6899) has introduced a serious regression: USB keyboards and mice can become completely unresponsive inside the Windows Recovery Environment (WinRE), leaving users unable to navigate recovery menus when they need them most.
Microsoft shipped the October cumulative security update (KB5066835) on October 14, 2025. Within days, field reports and vendor advisories began to surface describing a consistent failure: affected machines display the normal WinRE tiles and menus at boot, but USB input devices – including USB‑A, USB‑C, and USB‑attached wireless receivers – do not register any input in that environment. Critically, the same input devices function normally once the full Windows session starts, isolating the fault to the WinRE / Safe OS execution context rather than to general driver or hardware failure.
Microsoft acknowledged the problem publicly and marked the issue as confirmed for Windows 11 versions 25H2 and 24H2, and for Windows Server 2025, stating that an out‑of‑band fix was being prepared. Until that fix arrives, Microsoft recommends creating external recovery media and exercising caution around deployment of KB5066835, especially in environments that rely on WinRE for offline repair and troubleshooting.
The current bug effectively severs the primary phone line between the user and WinRE when USB devices are the only available input method. For modern laptops and desktops that ship without legacy PS/2 ports, that can mean locking the owner out of device recovery options entirely.
While Microsoft’s commitment to a prompt patch is reassuring, the window between patch release and field deployment can leave both home users and enterprise administrators exposed. Enterprises should monitor Windows Update channels closely for the out‑of‑band remediation and test it in a controlled environment before broad rollouts.
Steps (high level):
Caveats:
Testing your recovery media now — before you encounter a system fault — is essential. A tested external recovery drive eliminates most of the negative impact from the WinRE regression.
Key longer‑term risks:
Proactive measures — recovery USB drives, tested rollback procedures, and a small library of known‑good WinRE images — will reduce downtime and avoid panicked emergency responses when a future update introduces an unforeseen regression.
Microsoft’s quick acknowledgement and pledge to release an out‑of‑band fix is the correct immediate response. However, organizations and power users should not rely solely on vendor timelines. Short‑term actions — creating recovery media, delaying non‑critical deployments, and preparing rollback plans — are practical and necessary.
This episode should also prompt a broader discussion about test coverage for minimal environments and firmware diversity testing in the deployment pipeline. Until update validation increases to match the complexity of modern hardware, prudent administrators must assume some updates will need contingency plans and prepare accordingly.
For now, the core message is simple and urgent: if you use Windows 11, make a recovery USB now and audit your update deployment plan. That single action will mitigate most of the current risk while Microsoft works to deliver the patch that restores reliable WinRE functionality.
Source: ProPakistani This Alarming Windows 11 Issue Stops Your Mouse and Keyboard from Working
Background
Microsoft shipped the October cumulative security update (KB5066835) on October 14, 2025. Within days, field reports and vendor advisories began to surface describing a consistent failure: affected machines display the normal WinRE tiles and menus at boot, but USB input devices – including USB‑A, USB‑C, and USB‑attached wireless receivers – do not register any input in that environment. Critically, the same input devices function normally once the full Windows session starts, isolating the fault to the WinRE / Safe OS execution context rather than to general driver or hardware failure.Microsoft acknowledged the problem publicly and marked the issue as confirmed for Windows 11 versions 25H2 and 24H2, and for Windows Server 2025, stating that an out‑of‑band fix was being prepared. Until that fix arrives, Microsoft recommends creating external recovery media and exercising caution around deployment of KB5066835, especially in environments that rely on WinRE for offline repair and troubleshooting.
Why this matters: the role of WinRE
WinRE is the default, pre‑boot rescue environment for Windows. It is the toolset used to:- Repair startup failures using Startup Repair
- Access Safe Mode and advanced startup options
- Restore system images or apply system restores
- Run an offline Command Prompt for manual repairs
- Reset Windows while preserving or removing files
The current bug effectively severs the primary phone line between the user and WinRE when USB devices are the only available input method. For modern laptops and desktops that ship without legacy PS/2 ports, that can mean locking the owner out of device recovery options entirely.
Scope and symptoms
Platforms affected
- Windows 11, version 25H2
- Windows 11, version 24H2
- Windows Server 2025
Typical user experience
- The system boots to the WinRE tiles (Choose an option → Troubleshoot → Advanced options), but the cursor is invisible and keystrokes have no effect.
- USB keyboard and mouse work normally while Windows is running; the failure appears only inside WinRE.
- Systems with legacy PS/2 keyboard and mouse typically retain WinRE input functionality because PS/2 devices are handled by a different legacy stack that isn’t impacted by this regression.
- Systems that rely exclusively on USB‑C input (many modern thin laptops and mini‑PCs) are particularly vulnerable because they often lack any legacy fallback.
Common patterns observed
- Reproducible immediately after installing KB5066835.
- Affects wide range of hardware (consumer laptops, OEM desktops, mini‑PCs).
- Field reports show consistent reproduction across different brands and chipsets, suggesting the problem resides in the WinRE image or Safe OS driver set deployed by the update rather than a single vendor driver.
Immediate risks and real‑world impact
This is not a benign annoyance. The bug amplifies existing recovery risk in several ways:- Loss of access to built‑in recovery tools: When WinRE is unresponsive, users cannot run Startup Repair, System Restore, Deploy Image Servicing and Management (DISM) offline fixes, or boot to Safe Mode via the recovery menus.
- Higher support burden for IT teams: Help desks and on‑site technicians now need alternate recovery workflows for impacted clients. That means longer downtime, more physical interventions, and more workarounds.
- Bricking potential for inexperienced users: Users who rely on WinRE to repair a non‑booting PC may be unable to recover without technical help; some may attempt risky fixes like reinstalling Windows or replacing partition images without adequate backups.
- Remote/managed repair is harder: Organizations that depend on unattended remote recovery workflows — or that send technicians with only USB‑connected tools — may face blocked recovery operations.
- Security vs recoverability trade‑off: Rolling back a security update to restore WinRE input reintroduces the original security exposure patch KB5066835 was meant to address. That trade‑off is painful for security‑sensitive environments.
What Microsoft has said and the current status
Microsoft has publicly confirmed the issue and listed it in the Windows release health / known issues page. Their advisory acknowledges that the problem began after the October 14, 2025 update and that engineers were working on a fix. The company advised creating external recovery media as a mitigation and indicated that an out‑of‑band fix would be released in the coming days.While Microsoft’s commitment to a prompt patch is reassuring, the window between patch release and field deployment can leave both home users and enterprise administrators exposed. Enterprises should monitor Windows Update channels closely for the out‑of‑band remediation and test it in a controlled environment before broad rollouts.
Practical workarounds and mitigations
There are several mitigation paths of varying risk and complexity. Choose the option that best fits your technical comfort level and operational constraints.1. Create external recovery media (strongly recommended)
Creating a bootable Windows installation or recovery drive is the safest near‑term mitigation. External media boots its own WinRE image and is independent of the internal disk’s WinRE image, so USB device input is typically available from the installer/recovery environment.Steps (high level):
- Use a healthy Windows PC to create a recovery or installation USB:
- Use the built‑in Create a recovery drive tool (Recovery → Create a recovery drive).
- Or use the Media Creation Tool / Windows installation ISO and Rufus to build a bootable USB installer.
- Boot the affected PC from the USB (use the vendor boot menu or change boot order in UEFI).
- Access repair options from the external media to run repairs or restore system state.
- External media supplies a fresh WinRE/Safe OS image that is not modified by the problematic cumulative update on the internal disk.
- It provides a reliable path to offline repairs and command‑line tools.
- If your system can’t boot to USB due to firmware config, you may need to enable legacy/UEFI USB boot or change Secure Boot settings.
- Some vendors use proprietary recovery partitions or firmware; test the boot process before an emergency occurs.
2. Use PS/2 peripherals where available
If your machine has legacy PS/2 keyboard or mouse ports, those devices remain functional inside WinRE for affected systems. This is a narrow workaround because most modern laptops and many mini‑PCs lack PS/2 support.3. Roll back the update
If KB5066835 is already installed and you need immediate WinRE access, uninstalling the update can restore the previous WinRE image. You can uninstall updates from within Windows (Settings → Windows Update → Update history → Uninstall updates) or use the command line (wusa /uninstall /kb:5066835).Caveats:
- Rolling back a security update is a trade‑off: you restore recoverability but lose the security fixes that the update provided.
- Some managed environments block uninstall of certain mandatory updates; check policy and compliance requirements first.
4. Replace the WinRE image (advanced, risky)
Technically skilled users and administrators can manually replace the internal WinRE image (winre.wim) with a safe copy from a prior Windows image or a Windows ISO. The process typically involves:- Booting from external installation media.
- Mounting the system partition and locating the WinRE image (usually at \Windows\System32\Recovery\Winre.wim or on a separate recovery partition).
- Replacing the updated winre.wim with a known good copy extracted from a previous Windows ISO.
- Re‑enabling WinRE using reagentc /enable.
- Mistakes can render the system unbootable.
- OEM customizations and recovery partitions may be overwritten.
- The process may violate corporate change controls.
Step‑by‑step: Create a Windows recovery USB (detailed)
- On a working Windows PC, insert a USB drive (8 GB minimum recommended).
- Search for Create a recovery drive in Windows and run it as an administrator.
- If prompted, choose to back up system files to the recovery drive (this option makes the drive larger but more capable).
- Select the correct USB drive and proceed with the creation process.
- When complete, safely eject the USB and test it by booting another machine (or the target PC) using the vendor boot key to ensure it boots to the recovery environment.
Testing your recovery media now — before you encounter a system fault — is essential. A tested external recovery drive eliminates most of the negative impact from the WinRE regression.
Guidance for IT administrators and managed environments
- Pause or defer deployment of KB5066835 across sensitive endpoints if you have not yet deployed it to broad production. Evaluate the update in a controlled pilot group first.
- Prepare recovery media for all critical assets and consider distributing bootable USB sticks to field technicians and key users.
- Update support playbooks to include external media and alternate recovery procedures; train frontline staff on the manual replacement of winre.wim only if your team has the necessary expertise.
- Document rollback policies and identify windows where rollback of KB5066835 is acceptable from a security posture perspective.
- Monitor vendor and Microsoft channels for the out‑of‑band fix and schedule rapid testing and deployment once Microsoft releases the patch.
- Inventory devices that lack PS/2 fallback and prioritize those machines for manual intervention or conservative update scheduling.
- Communicate to users the risks and provide straightforward instructions for creating a recovery USB or contacting support for assistance.
Technical analysis: what likely went wrong
The failure pattern isolates the issue to the Safe OS / WinRE environment. Several technical explanations are plausible:- WinRE image update regression: The October servicing wave often includes companion updates for the WinRE image (the Safe OS). If that dynamic image update omitted or changed the USB input driver stack, USB devices may not be bound during WinRE init.
- Driver packaging/compatibility: WinRE uses a minimal driver set. A driver dependency or incorrectly packaged driver for USB host controllers could fail to load in Safe OS even though the full OS can initialize it.
- Enumeration timing or controller initialization: USB controllers on newer platforms (USB 3.1/USB‑C) sometimes require specific initialization sequences. If the Safe OS startup path changed timing or power sequencing, devices might not be enumerated.
- Secure Boot/driver signing interplay: Changes to the driver manifest or signing requirements for the WinRE image could theoretically block loading of certain drivers in the minimal environment, though this is less likely given the widespread hardware impact.
Risk assessment and longer‑term considerations
This bug highlights a broader tension in modern OS maintenance: the balance between rapidly delivering security fixes and ensuring that the minimal recovery environment remains robust across the vast diversity of hardware drivers and firmware configurations.Key longer‑term risks:
- Erosion of trust in automatic patching: Incidents that break recovery tools may encourage users and enterprises to delay or disable automatic updates — a behavior that increases exposure to unpatched vulnerabilities.
- Operational overhead: Repeated regressions require help desks to maintain ancillary recovery media and complex playbooks, increasing support costs.
- Supply chain complexity: As OEMs and Microsoft jointly ship firmware, drivers, and recovery images, pinpointing responsibility for regressions gets harder. Enterprises must increase validation of updates across real device fleets.
- Prioritize creation and distribution of standardized recovery media across device fleets.
- Increase pre‑deployment testing on representative hardware images that mimic the variety of USB controller topologies in the field.
- Maintain a baseline WinRE image repository that can be used to restore devices that encounter Safe OS failures.
What to do right now — quick checklist
- If KB5066835 is not yet installed on critical systems, consider delaying installation until Microsoft’s patch is available and tested.
- Immediately create external recovery media for all important PCs and servers.
- For currently impacted machines, attempt recovery with external installation media; if that’s not possible, evaluate rollback of the update from within Windows.
- Avoid risky manual edits to recovery partitions unless performed by experienced technicians and after backups.
- Keep users informed and provide clear instructions for contacting support if they encounter non‑booting systems.
Why this incident should change how you prepare
Modern PCs increasingly rely on USB input and boot‑time subsystems that can be fragile when updates touch the minimal boot environment. This incident underscores why redundant recovery paths matter: an external installer USB, a documented rollback procedure, and trained support staff are not optional extras — they are essential components of a resilient patching strategy.Proactive measures — recovery USB drives, tested rollback procedures, and a small library of known‑good WinRE images — will reduce downtime and avoid panicked emergency responses when a future update introduces an unforeseen regression.
Final analysis and outlook
The Windows 11 KB5066835 WinRE regression is an important reminder that the recovery environment is as critical as the main OS itself. When tools meant to rescue a broken machine fail, the consequences ripple across individual users and enterprise operations alike.Microsoft’s quick acknowledgement and pledge to release an out‑of‑band fix is the correct immediate response. However, organizations and power users should not rely solely on vendor timelines. Short‑term actions — creating recovery media, delaying non‑critical deployments, and preparing rollback plans — are practical and necessary.
This episode should also prompt a broader discussion about test coverage for minimal environments and firmware diversity testing in the deployment pipeline. Until update validation increases to match the complexity of modern hardware, prudent administrators must assume some updates will need contingency plans and prepare accordingly.
For now, the core message is simple and urgent: if you use Windows 11, make a recovery USB now and audit your update deployment plan. That single action will mitigate most of the current risk while Microsoft works to deliver the patch that restores reliable WinRE functionality.
Source: ProPakistani This Alarming Windows 11 Issue Stops Your Mouse and Keyboard from Working