Microsoft: Some Windows Servers Enter Reboot Loops After April Patches

Microsoft: Some Windows Servers Enter Reboot Loops After April Patches

BleepingComputer
BleepingComputerApr 17, 2026

Companies Mentioned

Why It Matters

The outage can cripple enterprise authentication services, exposing organizations to operational downtime and heightened security risk. Prompt mitigation is essential to preserve business continuity and protect privileged access workflows.

Key Takeaways

  • KB5082063 triggers LSASS crashes on non‑GC domain controllers
  • Only servers using Privileged Access Management are affected
  • Issue spans Server 2016 through Server 2025 versions
  • Microsoft recommends contacting Support for interim mitigation

Pulse Analysis

Microsoft’s monthly "Patch Tuesday" cadence delivers critical security updates for Windows Server, but the cadence has a history of unintended side effects. Recent patches, such as the June 2025 update that broke authentication and the March 2024 emergency out‑of‑band fix, illustrate how tightly coupled domain‑controller code can be vulnerable to regression. \n\nThe technical trigger lies in the interaction between LSASS and Privileged Access Management (PAM) configurations.

When PAM is enabled, LSASS performs additional credential checks during startup; the new patch introduces a fault that forces the service to terminate, prompting the server to reboot repeatedly. For enterprises, the symptom translates to a loss of authentication, directory services, and potentially a complete domain outage, jeopardizing access to critical applications and data. \n\nThe broader lesson for IT leaders is the renewed importance of rigorous patch testing and change‑management discipline.

Staging environments that mirror production PAM settings can surface LSASS‑related regressions before they reach live domains. Administrators should also maintain redundant domain controllers, monitor Microsoft’s health dashboard, and consider deferred deployment for high‑risk servers. As Microsoft investigates related KB5082063 installation failures and BitLocker prompts, organizations that stay proactive—by applying mitigations, backing up system state, and keeping communication lines open with Microsoft Support—will minimize disruption and preserve the integrity of privileged access workflows.

Microsoft: Some Windows servers enter reboot loops after April patches

Comments

Want to join the conversation?

Loading comments...