Thursday, January 2, 2025
HomeCyber Security NewsMicrosoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates

Microsoft Warns of Windows 11 24H2 Issue that Blocks Windows Security Updates

Published on

SIEM as a Service

Microsoft has issued a warning about a significant issue impacting devices running Windows 11, version 24H2, that could block essential Windows Security updates.

The problem arises when users install this version of the operating system using media—such as CDs or USB drives—containing either the October 2024 or November 2024 security updates.

If affected, devices may be left in a state where subsequent security updates cannot be applied, leaving the system vulnerable.

- Advertisement - SIEM as a Service

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Details of the Issue

According to Microsoft’s official release, the issue is specific to installation media that integrates the October or November security patches (released between October 8, 2024, and November 12, 2024).

Devices utilizing the standard Windows Update process to install these security patches are unaffected. However, devices installed from flawed media may not receive critical future updates, compromising their security posture.

Affected Platforms

  • Client: Windows 11, version 24H2
  • Server: None

This issue does not extend to older versions of Windows or other platforms.

To mitigate the problem, Microsoft urges users and IT administrators not to install Windows 11, version 24H2, using installation media that includes October or November’s updates.

Instead, ensure that the installation media is updated to include the December 2024 monthly security update (released on December 10, 2024) or later. Users can also utilize the standard Windows Update mechanism, which does not encounter this issue.

For those who have already installed Windows 11, version 24H2 using the problematic media, Microsoft is actively working on a resolution but has yet to provide a detailed fix. Affected users should monitor Microsoft’s update page for further guidance.

This installation-related flaw joins a list of known issues affecting Windows 11, version 24H2.

Other reported problems include audio failures on devices with specific drivers, Auto HDR-related gaming glitches, and compatibility issues with third-party applications like Google Workspace Sync.

While most of these issues have either been mitigated or resolved, the current installation media problem poses a critical security risk that requires immediate attention.

Microsoft is collaborating with partners to resolve the issue and will provide updates as new fixes are developed.

Users are encouraged to check for OS updates regularly, follow Microsoft’s prescribed guidelines for creating installation media, and stay informed through official channels like the Windows Release Health page.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SmuggleShield – Browser Extension to Detect HTML Smuggling Attacks

SmuggleShield, a recently launched browser extension, is gaining attention in the cybersecurity space for...

EC2 Grouper Hackers Using AWS Tools To Exploit Compromised Credentials

Cloud security researchers have uncovered alarming trends in identity compromises within Amazon Web Services...

Trend Micro Apex One Vulnerabilities Let Escalate Privilege

Trend Micro has addressed six high-severity vulnerabilities in its Apex One and Apex One as a Service product,...

US Army Soldier Arrested for Allegedly Selling Customer Call Records From AT&T & Verizon

A 20-year-old U.S. Army soldier, Cameron John Wagenius, has been arrested and indicted by...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

SmuggleShield – Browser Extension to Detect HTML Smuggling Attacks

SmuggleShield, a recently launched browser extension, is gaining attention in the cybersecurity space for...

EC2 Grouper Hackers Using AWS Tools To Exploit Compromised Credentials

Cloud security researchers have uncovered alarming trends in identity compromises within Amazon Web Services...

Trend Micro Apex One Vulnerabilities Let Escalate Privilege

Trend Micro has addressed six high-severity vulnerabilities in its Apex One and Apex One as a Service product,...