Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Avada Builder Flaws Affect 1 Million WordPress Sites with
May 18, 2026
Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922
May 18, 2026
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Home/CyberSecurity News/Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922
CyberSecurity News

Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922

Microsoft has confirmed a critical installation failure impacting its May 2026 Patch Tuesday cumulative update for Windows 11, KB5089549. The issue results in users encountering error code...

Marcus Rodriguez
Marcus Rodriguez
May 18, 2026 2 Min Read
2 0

Microsoft has confirmed a critical installation failure impacting its May 2026 Patch Tuesday cumulative update for Windows 11, KB5089549. The issue results in users encountering error code 0x800f0922, with some also reporting additional errors 0x80240069 and 0x80240031.

The known issue was formally added to the update’s change log on May 15, 2026, just three days after the patch’s release.

Released on May 12, 2026, KB5089549 is a mandatory cumulative update for Windows 11 versions 25H2 and 24H2, advancing OS builds to 26200.8457 and 26100.8457, respectively.

The update bundles the latest May 2026 security fixes, non-security quality improvements from April’s optional preview release (KB5083631), and critical Secure Boot infrastructure changes.

Given its classification as a required security update, Windows attempts to install it automatically, making the installation failure particularly disruptive for affected devices.

The confirmed root cause behind error 0x800f0922 is insufficient space in the EFI System Partition (ESP), a reserved, low-capacity partition on the device’s drive that stores critical boot files.

KB5089549 introduces significant Secure Boot infrastructure changes, including a new SecureBoot folder under C:Windows on eligible devices, along with sample automation scripts designed to help IT administrators manage certificate updates across enterprise fleets.

These additions expand the footprint of files written to the ESP during installation, triggering the failure on systems with insufficient free space on the partition.

A central feature of this update is the phased rollout of new Secure Boot certificates, which adds high-confidence device targeting data to increase coverage of eligible devices.

Devices only receive the new certificates after demonstrating sufficient successful update signals, maintaining a controlled rollout.

Additionally, the update ships example scripts under the new SecureBoot directory, enabling IT professionals in Active Directory environments to automate Secure Boot certificate deployment via safe rollout mechanisms.

Other Critical Fixes in This Update

Beyond the Secure Boot improvements, KB5089549 addresses several significant issues:

  • BitLocker Recovery Loop Fixed: The update resolves a known issue where devices running April 2026’s KB5083769 could enter BitLocker Recovery after boot file updates, particularly on systems with invalid PCR7 (Platform Configuration Register 7) TPM validation settings.
  • Boot Manager Reliability: Improvements to startup reliability ensure devices boot normally after boot file updates without entering recovery mode.
  • SSDP Service Stability: Reliability improvements to Simple Service Discovery Protocol (SSDP) notifications prevent the service from becoming unresponsive.
  • Daylight Saving Time: The update adds DST support for the 2023 change affecting the Arab Republic of Egypt.

Mitigations

Microsoft is actively rolling out a fix for affected devices. System administrators managing enterprise environments can leverage the new Secure Boot automation scripts available after installing the update to monitor certificate update status and manage phased deployment via Active Directory.

Organizations should monitor the Windows Release Health Dashboard for the latest remediation status.

Users who have previously installed prior cumulative updates will only download the incremental changes included in this package, potentially reducing ESP space requirements on already-updated systems.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

PatchSecurity

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access

Next Post

Avada Builder Flaws Affect 1 Million WordPress Sites with

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Claude Code RCE Flaw: Execute Commands Lets Attackers
May 18, 2026
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us