Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
May 15, 2026
Home/CyberSecurity News/Microsoft: Windows Servers Reboot Loop After April Patches
CyberSecurity News

Microsoft: Windows Servers Reboot Loop After April Patches

Microsoft has confirmed a critical known issue impacting Windows Server 2025 domain controllers. Following installation of the April 2026 Patch Tuesday cumulative update, KB5082063, affected servers...

Sarah simpson
Sarah simpson
April 17, 2026 3 Min Read
11 0

Microsoft has confirmed a critical known issue impacting Windows Server 2025 domain controllers. Following installation of the April 2026 Patch Tuesday cumulative update, KB5082063, affected servers are entering repeated reboot loops.

Released on April 14, 2026, the cumulative update KB5082063 (OS Build 26100.32690) is the standard monthly security update for Windows Server 2025, bundling the latest security fixes along with non-security improvements from March’s optional preview release.

However, Microsoft’s official release changelog updated on April 16, 2026, now includes a known issue noting that “Domain controllers might restart repeatedly after installing this update,” flagging the reboot loop problem for enterprise IT administrators.

The issue is compounded by a secondary problem: a subset of Windows Server 2025 systems is also failing to install the update entirely, throwing error code 0x800F0983 during deployment.

Microsoft acknowledged it is actively monitoring diagnostic telemetry tied to the recurring install failure and confirmed that “a limited number of affected servers might experience an installation failure accompanied by the error code 800F0983”.

Sysadmin reports on Reddit’s Patch Tuesday megathread corroborate Microsoft’s warning, with one administrator noting a domain controller became “stuck in a reboot loop” following KB5082063 installation.

Booting into Directory Services Restore Mode (DSRM) was reported as functional, and uninstalling the update allowed the affected domain controller to reboot normally.

This points squarely at the update as the root cause, particularly for non-Global Catalog (non-GC) domain controllers in complex Active Directory environments.

BitLocker Recovery Triggered

Separately, Microsoft warned that devices with unrecommended BitLocker Group Policy configurations may be forced to enter BitLocker recovery mode after installing KB5082063, a known issue added to the changelog on April 14, 2026.

While this is unlikely to affect home users, enterprise-managed servers with specific BitLocker policies could face access disruptions requiring manual recovery key entry.

What’s Fixed in KB5082063

Despite the issues, the update delivers meaningful security and reliability improvements across several components:

  • Kerberos protocol — Changes the default DefaultDomainSupportedEncTypes value to AES-SHA1 for accounts lacking explicit AD encryption type definitions, tied to CVE-2026-20833
  • Secure Boot — Adds high-confidence device targeting data for phased rollout of new Secure Boot certificates, reducing BitLocker recovery risk during transitions
  • Remote Desktop — Strengthens phishing protection against malicious .rdp files by displaying all requested connection settings before connecting
  • Windows Deployment Services (WDS) — Disables the “Hands-Free Deployment” feature by default, hardening against CVE-2026-0386
  • SMB over QUIC — Improves compression reliability, reducing timeouts for hybrid and cloud-connected environments
  • PowerShell — Fixes the Set-GPPrefRegistryValue cmdlet to correctly preserve all imported registry values

Microsoft has not yet published a formal workaround or fix timeline for the reboot loop issue, and an investigation into the 0x800F0983 install failure is ongoing.

IT administrators are advised to monitor the Windows Server 2025 release health dashboard for real-time updates, pause KB5082063 deployment on domain controllers until a resolution is available, and maintain offline BitLocker recovery keys ahead of patching.

The servicing stack update KB5082062 (Build 26100.32692) is bundled alongside this release to ensure update infrastructure reliability.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

CVEPatchphishingSecurity

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Critical One-Click RCE in Azure Windows Admin Center Explo

Next Post

Windows Snipping Tool Flaw Enables Network Spoofing Attacks

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us