Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/CyberSecurity News/Windows 11 KB5077181 Security Update Causing Some Devices to
CyberSecurity News

Windows 11 KB5077181 Security Update Causing Some Devices to

Microsoft’s February 10, 2026, security update KB5077181 for Windows 11 versions 24H2 (build 26200.7840) and 25H2 (build 26100.7840) has triggered widespread reports of critical boot failures Users...

Sarah simpson
Sarah simpson
February 15, 2026 2 Min Read
0 0

Microsoft’s February 10, 2026, security update KB5077181 for Windows 11 versions 24H2 (build 26200.7840) and 25H2 (build 26100.7840) has triggered widespread reports of critical boot failures

Users describe devices entering infinite restart loops, often exceeding 15 cycles, preventing access to the desktop.

This cumulative update delivers essential security fixes alongside quality improvements from prior releases like KB5074109.

Microsoft security updates address 58 vulnerabilities across Windows components, including six zero-days actively exploited in the wild, as confirmed by CISA’s Known Exploited Vulnerabilities catalog.

Key patches target elevation of privilege flaws, remote code execution risks, and security bypasses in core systems.

CVE ID Description
CVE-2026-21510 Windows Shell security feature bypass allowing SmartScreen evasion via malicious links.
CVE-2026-21519 Desktop Window Manager elevation of privilege to SYSTEM level.
CVE-2026-21533 Windows Remote Desktop Services elevation of privilege; exploited zero-day.
CVE-2026-20841 Notepad remote code execution via crafted Markdown files.

The update also rolls out new Secure Boot certificates to preempt 2011 certificate expirations in June 2026, enhancing boot integrity while fixing gaming eligibility checks and WPA3 Wi-Fi connectivity.

Despite these benefits, Microsoft lists no known issues on its release page or health dashboard as of February 15.

Reported Boot Loops and Workarounds

Affected systems fail post-installation, displaying System Event Notification Service (SENS) errors like “a specified procedure could not be found” at login, alongside DHCP failures causing internet loss despite active connections.

Installation errors such as 0x800f0983 and 0x800f0991 compound the problems, primarily on select hardware configurations. Community forums like Reddit, Microsoft Answers, and ElevenForum document dozens of cases, with some users recovering partial access for repairs.

To resolve, uninstall KB5077181 immediately. From a working desktop, navigate to Control Panel > Programs and Features > View installed updates, select the KB, and uninstall before restarting; pause Windows Update afterward to block reinstallation.

If boot loops persist, enter Windows Recovery Environment (interrupt boot thrice or use media), select Troubleshoot > Advanced options > Command Prompt, and execute: wusa /uninstall /kb:5077181 /quiet /norestart.

Run sfc /scannow for file repairs if needed. Enterprises should deploy via WSUS with testing, monitoring, and release health for fixes.

While positive changes like Nvidia black screen resolutions and explorer.exe stability aid some users, the instability underscores Patch Tuesday risks. Microsoft has yet to acknowledge officially, but user reports urge caution on non-essential systems.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

CVEExploitPatchSecurityzero-day

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

PentestAgent: AI Pentest Tool with Attack Playbooks

Next Post

Attackers Actively Exploit Critical Chrome 0 Vulnerability Exploited

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us