CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 17, 2026

Microsoft Confirms Windows Servers Enter Reboot Loops Following April Patches

Cybersecurity News Archived Apr 17, 2026 ✓ Full text saved

Microsoft has confirmed a critical known issue affecting Windows Server 2025 domain controllers following the deployment of the April 2026 Patch Tuesday cumulative update, KB5082063, where affected servers are entering repeated reboot loops after installation. Released on April 14, 2026, the cumulative update KB5082063 (OS Build 26100.32690) is the standard monthly security update for Windows […] The post Microsoft Confirms Windows Servers Enter Reboot Loops Following April Patches appeared firs

Full text archived locally
✦ AI Summary · Claude Sonnet


    Home Cyber Security Microsoft Confirms Windows Servers Enter Reboot Loops Following April Patches Microsoft has confirmed a critical known issue affecting Windows Server 2025 domain controllers following the deployment of the April 2026 Patch Tuesday cumulative update, KB5082063, where affected servers are entering repeated reboot loops after installation. Released on April 14, 2026, the cumulative update KB5082063 (OS Build 26100.32690) is the standard monthly security update for Windows Server 2025, bundling the latest security fixes along with non-security improvements from March’s optional preview release. However, Microsoft’s official release changelog updated on April 16, 2026, now includes a known issue noting that “Domain controllers might restart repeatedly after installing this update,” flagging the reboot loop problem for enterprise IT administrators. The issue is compounded by a secondary problem: a subset of Windows Server 2025 systems is also failing to install the update entirely, throwing error code 0x800F0983 during deployment. Microsoft acknowledged it is actively monitoring diagnostic telemetry tied to the recurring install failure and confirmed that “a limited number of affected servers might experience an installation failure accompanied by the error code 800F0983”. Sysadmin reports on Reddit’s Patch Tuesday megathread corroborate Microsoft’s warning, with one administrator noting a domain controller became “stuck in a reboot loop” following KB5082063 installation. Booting into Directory Services Restore Mode (DSRM) was reported as functional, and uninstalling the update allowed the affected domain controller to reboot normally. This points squarely at the update as the root cause, particularly for non-Global Catalog (non-GC) domain controllers in complex Active Directory environments. BitLocker Recovery Triggered Separately, Microsoft warned that devices with unrecommended BitLocker Group Policy configurations may be forced to enter BitLocker recovery mode after installing KB5082063, a known issue added to the changelog on April 14, 2026. While this is unlikely to affect home users, enterprise-managed servers with specific BitLocker policies could face access disruptions requiring manual recovery key entry. What’s Fixed in KB5082063 Despite the issues, the update delivers meaningful security and reliability improvements across several components: Kerberos protocol — Changes the default DefaultDomainSupportedEncTypes value to AES-SHA1 for accounts lacking explicit AD encryption type definitions, tied to CVE-2026-20833 Secure Boot — Adds high-confidence device targeting data for phased rollout of new Secure Boot certificates, reducing BitLocker recovery risk during transitions Remote Desktop — Strengthens phishing protection against malicious .rdp files by displaying all requested connection settings before connecting Windows Deployment Services (WDS) — Disables the “Hands-Free Deployment” feature by default, hardening against CVE-2026-0386 SMB over QUIC — Improves compression reliability, reducing timeouts for hybrid and cloud-connected environments PowerShell — Fixes the Set-GPPrefRegistryValue cmdlet to correctly preserve all imported registry values Microsoft has not yet published a formal workaround or fix timeline for the reboot loop issue, and an investigation into the 0x800F0983 install failure is ongoing. IT administrators are advised to monitor the Windows Server 2025 release health dashboard for real-time updates, pause KB5082063 deployment on domain controllers until a resolution is available, and maintain offline BitLocker recovery keys ahead of patching. The servicing stack update KB5082062 (Build 26100.32692) is bundled alongside this release to ensure update infrastructure reliability. Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories. RELATED ARTICLESMORE FROM AUTHOR Cyber Security News Windows Snipping Tool Vulnerability Allows Attacker to Perform Spoofing Over a Network Cyber Security News One-Click RCE in Azure Windows Admin Center Allow Attacker to Execute Arbitrary Commands Cyber Security News Hackers Target Israeli Desalination Plants With ZionSiphon Sabotage Malware Top 10 Top 10 Best User Access Management Tools in 2026 April 4, 2026 Top 10 Best VPN For Chrome in 2026 April 4, 2026 20 Best Application Performance Monitoring Tools in 2026 April 3, 2026 Top 10 Best VPN For Linux In 2026 April 3, 2026 10 Best VPN For Privacy In 2026 April 2, 2026
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    Apr 17, 2026
    Archived
    Apr 17, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗