VulnerabilitiesHIGH

Windows 11 - Emergency Update Resolves Installation Loop Issues

Featured image for Windows 11 - Emergency Update Resolves Installation Loop Issues
CSCyber Security News
Windows 11KB5086672installation looperror code 0x80073712Microsoft
🎯

Basically, Microsoft fixed a problem that prevented Windows 11 users from installing updates.

Quick Summary

Microsoft has issued an emergency update to fix a critical installation loop affecting Windows 11 users. This update is vital for maintaining system security. Users can easily apply the fix through standard update channels. Don't miss out on this important patch!

What Happened

On March 31, 2026, Microsoft released an emergency out-of-band update, KB5086672, to address a critical installation failure affecting Windows 11 users. This update specifically targets systems running Windows 11 versions 25H2 and 24H2. The issue arose from a bug introduced in the March 26 non-security preview update, known as KB5079391, which caused many devices to get stuck in an installation loop. Users encountered error code 0x80073712, indicating missing or corrupted update files, preventing them from applying necessary system improvements.

To mitigate this disruption, Microsoft has pulled the problematic March 26 update from circulation. The new KB5086672 update not only resolves the setup bug but also integrates previous security and quality improvements. This cumulative update ensures that users can successfully complete their installations and maintain security baselines moving forward.

Who's Affected

The installation loop issue primarily affects users of Windows 11 versions 25H2 and 24H2. Many of these users have faced significant frustration as their systems repeatedly failed to install updates. This problem is particularly concerning for enterprise environments, where reliable update deployment is critical for maintaining security and operational efficiency.

By addressing this installation loop, Microsoft aims to restore normalcy for affected users and help them receive future updates without manual intervention. The fix is crucial for users who rely on their systems for daily tasks and need to ensure they are protected against vulnerabilities.

Patch Status

The KB5086672 update is designed as a cumulative package that rolls up previous updates from earlier in March. It includes fixes from the March 10 and March 21 releases while permanently resolving the underlying setup bug. Applying this update pushes the operating system builds forward to versions 26200.8117 and 26100.8117.

In addition to fixing the installation loop, Microsoft has also upgraded several local AI components, enhancing their functionality. These upgrades are essential for maintaining accurate local data processing and minimizing potential software conflicts. Users can easily acquire this fix through standard update channels, or manually check for updates in their settings.

Immediate Actions

For standard users, acquiring the fix is straightforward. Devices with the priority update toggle enabled will receive the patch automatically. Alternatively, users can check for optional updates manually. For enterprise security teams, utilizing Microsoft Intune or Windows Autopatch can expedite the deployment of this fix across networks.

It's important to note that because this release bundles the latest Servicing Stack Update directly with the cumulative update, security teams cannot use the standard Windows Update Standalone Installer tool to roll back the patch. In case of an emergency removal, system administrators must run the DISM command-line tool to target and manually remove the package. Ensuring that endpoints can reliably receive future updates is essential for maintaining security and functionality.

🔒 Pro insight: The swift release of KB5086672 highlights Microsoft's commitment to rapid response in critical patch management scenarios.

Original article from

CSCyber Security News· Abinaya
Read Full Article

Related Pings

HIGHVulnerabilities

Google Chrome - Fourth Zero-Day Vulnerability Fixed

Google has patched a fourth zero-day vulnerability in Chrome exploited in attacks this year. Users across all platforms are affected and should update immediately to avoid risks.

BleepingComputer·
HIGHVulnerabilities

Libpng Vulnerabilities - Attackers Trigger Crashes and Leaks

Two high-severity vulnerabilities in libpng have been discovered, allowing attackers to crash processes and leak sensitive information. Immediate updates are essential to protect systems.

Cyber Security News·
MEDIUMVulnerabilities

Windows 11 Emergency Update - Fixes Installation Issues

Microsoft has released an emergency update to fix installation issues with the March 2026 preview update for Windows 11. Users running affected versions should ensure their systems are updated to avoid risks. This update addresses critical installation errors and restores functionality.

BleepingComputer·
HIGHVulnerabilities

Apple Issues Backported Patches for iOS 18 Against DarkSword

Apple is rolling out backported patches for iOS 18 to combat the DarkSword hacking tool. Millions of iPhone users can now secure their devices without upgrading to iOS 26. This change highlights the growing threat of sophisticated hacking techniques targeting older software versions.

Wired Security·
HIGHVulnerabilities

CVE-2026-20929 - Detecting Kerberos Authentication Relay

A new vulnerability, CVE-2026-20929, allows attackers to exploit Kerberos authentication via DNS CNAME abuse. This poses significant risks to Active Directory environments. Organizations must patch systems and monitor for unusual authentication patterns to mitigate these threats.

CrowdStrike Blog·
CRITICALVulnerabilities

CVE-2025-53521 - F5 BIG-IP APM Vulnerability Exploited

F5 has reclassified a vulnerability in BIG-IP APM as critical, allowing unauthenticated remote code execution. Organizations must upgrade to the latest versions to mitigate risks. Immediate action is essential to protect sensitive data.

Arctic Wolf Blog·