.August 2025 Patch Tuesday: A Month of Fixes and Frustrations
Microsoft rolled out one of its biggest Patch Tuesdays in August 2025, fixing 107 security flaws across its systems. To break it down, the update addressed 13 critical vulnerabilities and a zero-day flaw in Windows Kerberos. While these fixes boosted security, they also triggered a wave of new problems. Soon after the rollout, users began reporting failed installations, unstable systems, and hardware issues. Furthermore, enterprise environments and Windows 11 devices experienced the most severe impacts, prompting concerns about the reliability of the update process
Security Fixes: What Was Addressed?
Among the most critical vulnerabilities patched:
- CVE-2025-53786: A flaw in Microsoft Exchange Server allowing attackers to pivot into cloud environments like Exchange Online.
- CVE-2025-53779 (“BadSuccessor”): A Kerberos authentication bug enabling domain admin access.
- CVE-2025-53766 & CVE-2025-50165: Remote code execution vulnerabilities in Windows GDI+ graphics rendering.
- CVE-2025-53733: A Microsoft Word flaw exploitable via the Preview Pane.
- CVE-2025-53778: A Windows NTLM bug allowing SYSTEM-level privilege escalation
Installation Failures and Enterprise Headaches
The KB5063878 update for Windows 11 (24H2) has been particularly problematic:
- Error Code 0x80240069: This installation failure primarily affects enterprise deployments using WSUS/SCCM. Microsoft acknowledged the issue and released an emergency rollback policy to mitigate it.
- Event Viewer Errors: Post-installation, many users reported errors related to
CertificateServicesClient-CertEnroll
, linked to an inactive security feature. Microsoft has advised these can be safely ignored
SSD Failures: A Troubling Development
Perhaps the most alarming issue is the SSD malfunction reported by users after installing KB5063878:
- Drives with Phison controllers reportedly become unreadable after large sequential data writes.
- Users noted that drives “disappear” from the OS, with SMART data inaccessible and files unreadable.
- The issue appears tied to a kernel-level regression or storage driver bug, though it’s not yet widespread. Microsoft has not officially confirmed this bug, but experts recommend avoiding large write operations until a fix is issued
Workarounds and Recommendations
If you’re affected by the August 2025 update issues, consider the following steps to minimise disruption:
- Use the Update Catalog or Media Creation Tool to manually install updates.
- Apply the Known Issue Rollback policy for enterprise environments to restore system stability.
- Avoid heavy disk write operations if using SSDs with known vulnerabilities.
- Monitor Microsoft’s support channels for upcoming patches and fixes.
For more help or advise please contact Secure Chain Technology Group on : 01246 901392heavy disk write operations if you’re using SSDs known to be vulnerable