Saturday, January 4, 2025
HomeCyber Security NewsMicrosoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates

Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates

Published on

SIEM as a Service

Microsoft has issued a warning about a significant issue impacting devices running Windows 11, version 24H2, that could block essential Windows Security updates.

The problem arises when users install this version of the operating system using media—such as CDs or USB drives—containing either the October 2024 or November 2024 security updates.

If affected, devices may be left in a state where subsequent security updates cannot be applied, leaving the system vulnerable.

- Advertisement - SIEM as a Service

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Details of the Issue

According to Microsoft’s official release, the issue is specific to installation media that integrates the October or November security patches (released between October 8, 2024, and November 12, 2024).

Devices utilizing the standard Windows Update process to install these security patches are unaffected. However, devices installed from flawed media may not receive critical future updates, compromising their security posture.

Affected Platforms

  • Client: Windows 11, version 24H2
  • Server: None

This issue does not extend to older versions of Windows or other platforms.

To mitigate the problem, Microsoft urges users and IT administrators not to install Windows 11, version 24H2, using installation media that includes October or November’s updates.

Instead, ensure that the installation media is updated to include the December 2024 monthly security update (released on December 10, 2024) or later. Users can also utilize the standard Windows Update mechanism, which does not encounter this issue.

For those who have already installed Windows 11, version 24H2 using the problematic media, Microsoft is actively working on a resolution but has yet to provide a detailed fix. Affected users should monitor Microsoft’s update page for further guidance.

This installation-related flaw joins a list of known issues affecting Windows 11, version 24H2.

Other reported problems include audio failures on devices with specific drivers, Auto HDR-related gaming glitches, and compatibility issues with third-party applications like Google Workspace Sync.

While most of these issues have either been mitigated or resolved, the current installation media problem poses a critical security risk that requires immediate attention.

Microsoft is collaborating with partners to resolve the issue and will provide updates as new fixes are developed.

Users are encouraged to check for OS updates regularly, follow Microsoft’s prescribed guidelines for creating installation media, and stay informed through official channels like the Windows Release Health page.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...

Apple Agrees to $95M Settlement Over Siri Privacy Lawsuit

Apple Inc. has agreed to pay $95 million to settle a proposed class-action lawsuit...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several...

NTT Docomo Hit by DDoS Attack, Services Disrupted for 11 Hours

NTT Docomo, one of Japan’s leading telecommunications and IT service providers, experienced a massive...