Microsoft Releases Out-of-Band Updates to Resolve Critical Windows Server 2025 Installation Failures and Domain Controller Reboot Loops

In a rapid response to widespread reports of system instability within enterprise environments, Microsoft has officially released a series of out-of-band (OOB) updates designed to rectify several critical bugs introduced by the April 2026 Patch Tuesday cycle. These emergency patches target two primary issues: a persistent failure to install security updates on Windows Server 2025 and a catastrophic crash of the Local Security Authority Subsystem Service (LSASS) that has forced many domain controllers into an endless cycle of restarts. The release of these updates underscores the complexity of maintaining modern server infrastructure and the high stakes involved when core authentication services are compromised by routine security maintenance.
The primary focus of this emergency deployment is the resolution of issues stemming from the KB5082063 cumulative update. Following its initial release earlier this month, system administrators across the globe reported that the update would frequently fail to install on Windows Server 2025 machines, leaving them vulnerable and creating a significant backlog in maintenance schedules. Simultaneously, a more severe issue emerged regarding the LSASS process, a core component of the Windows operating system responsible for enforcing security policies and handling user logins. When LSASS crashes, the operating system is forced to reboot to maintain security integrity, leading to the "restart loops" that have plagued IT departments over the last week.
The LSASS Crisis and Domain Controller Stability
The most disruptive issue addressed in this out-of-band release is the crash of the Local Security Authority Subsystem Service. This service is the backbone of Windows security, managing everything from password changes to access token creation and the implementation of Active Directory (AD) authentication protocols. When a Windows Server is promoted to a Domain Controller (DC) role, the stability of LSASS becomes paramount, as every authentication request from workstations and users across the network must be processed by this service.
Microsoft’s investigation into the April 2026 updates revealed that certain domain controllers were experiencing memory access violations or process terminations within lsass.exe. This vulnerability was particularly pronounced on servers that process authentication requests very early in the boot sequence. In high-traffic environments or those with complex startup scripts, the timing of these requests coincided with the initialization of updated security components, leading to a fatal error. Once LSASS fails, Windows displays a warning and automatically initiates a system restart within 60 seconds, creating a loop that prevents the server from ever reaching a stable operational state.
The emergency updates released today are specifically engineered to handle these early-startup authentication requests more gracefully. For Windows Server 2025, the fix is bundled into KB5091157. For older but still supported versions of Windows Server, including 2022, 2019, and 2016, Microsoft has provided separate OOB updates that focus exclusively on the LSASS stability issue.
Addressing Windows Server 2025 Installation Failures
While the reboot loops affected a broad range of server versions, Windows Server 2025 faced a unique challenge. Many administrators found that the standard April security update, KB5082063, simply refused to install. The installation process would reach a certain percentage, stall, and then roll back with non-descript error codes. This prevented organizations from applying the latest security mitigations, creating a compliance gap for many enterprise users.

The new KB5091157 update serves as a "double-fix" for the 2025 edition. It not only resolves the underlying conflict that caused the installation failures of the previous KB but also incorporates the LSASS stability fixes. Microsoft has advised that administrators who were unable to install the April cumulative update should move directly to this out-of-band release to bring their systems up to current security standards.
The BitLocker Recovery Complication
Adding to the administrative burden, Microsoft also confirmed a secondary issue affecting Windows Server 2025. Following the installation of the initial April updates, some devices were found to boot directly into BitLocker recovery mode. This phenomenon occurs when the system detects a significant change in the boot configuration or the hardware environment—often triggered by updates to the Secure Boot variables or the Trusted Platform Module (TPM) interactions.
When a server enters BitLocker recovery, it requires the manual entry of a 48-digit recovery key. For organizations managing hundreds or thousands of virtual or physical servers, this requirement represents a logistical nightmare, especially if the recovery keys are not readily accessible via Active Directory or a centralized key management system. While the OOB updates focus on the LSASS and installation bugs, Microsoft continues to urge administrators to ensure they have their BitLocker recovery keys backed up before applying any further updates to Server 2025 environments.
A Chronology of Recent Windows Server Challenges
The April 2026 update issues are the latest in a series of technical hurdles for Microsoft’s server platform. To understand the current landscape, it is necessary to look back at the timeline of events leading up to this week’s emergency release:
- September 2024 – March 2026: A long-standing bug caused Windows Server 2019 and 2022 systems to "unexpectedly" upgrade to Windows Server 2025. This was often triggered by third-party patch management tools misinterpreting the upgrade as a standard security patch. Microsoft finally resolved this logic error in early April 2026.
- March 2026: Microsoft released OOB updates to fix broken sign-ins for Microsoft accounts and resolved installation issues that hindered the adoption of the March non-security preview updates.
- April 14, 2026 (Patch Tuesday): The KB5082063 update is released. Within hours, reports of installation failures on Server 2025 and LSASS crashes on Domain Controllers begin to surface on technical forums and support channels.
- April 18, 2026: Microsoft officially acknowledges the reboot loop issue, warning that even new domain controller setups could be affected.
- April 21, 2026: Microsoft issues the out-of-band updates (including KB5091157) to provide a definitive fix for the most critical issues.
Technical Analysis and Deployment Recommendations
For IT professionals, the deployment of out-of-band updates requires a different cadence than the standard monthly patch cycle. Because these updates are released outside the normal schedule, they are often not automatically pushed through Windows Update for Business or Windows Server Update Services (WSUS) unless manually imported from the Microsoft Update Catalog.
Microsoft has clarified that KB5091157 for Windows Server 2025 is cumulative, meaning it includes all previous security fixes in addition to the new emergency repairs. For other versions, such as Windows Server 2022, administrators should look for the specific KB numbers associated with their OS build to address the LSASS restart issue.
Industry analysts suggest that the frequency of these OOB updates in 2026 points to the increasing complexity of the Windows codebase as Microsoft integrates more advanced security features, such as hotpatching and enhanced virtualization-based security (VBS). While these features improve the overall security posture, they also increase the "surface area" for potential conflicts during the update process.

Impact on Enterprise Operations and Industry Reaction
The impact of a Domain Controller reboot loop cannot be overstated. In a modern enterprise, the DC is the "source of truth" for identity. If the DCs are offline or stuck in a restart cycle, employees cannot log into their computers, cloud services like Microsoft 365 may fail to authenticate users, and internal file shares become inaccessible.
"The LSASS issue essentially paralyzed our morning operations," said one systems administrator at a mid-sized financial firm. "We had to boot into Safe Mode to roll back the April update just to get the network back online. Having an emergency patch available within a week is helpful, but the initial disruption was significant."
The broader IT community has expressed a mix of relief and frustration. While the speed of the OOB release is praised, there is growing concern regarding the stability of the "Day One" patches released on Patch Tuesday. Many organizations are now re-evaluating their patch testing protocols, with some choosing to delay server updates by 7 to 10 days to ensure that any potential LSASS or installation bugs are identified and fixed by Microsoft before they hit production environments.
Looking Ahead: The Future of Windows Server Maintenance
As Microsoft moves forward with Windows Server 2025, the company is expected to lean more heavily on its "Hotpatching" technology. Hotpatching allows security updates to be applied to the memory of a running process without requiring a reboot. While this feature was initially limited to specific editions, its expansion is intended to mitigate the very issues seen this month—namely, the disruption caused by frequent restarts and the fragility of the boot sequence.
However, until hotpatching becomes the universal standard for all server roles, the traditional cumulative update model remains. Microsoft’s release of these emergency updates serves as a reminder of the critical partnership between software vendors and system administrators. As the infrastructure becomes more complex, the reliance on rapid, out-of-band communication and patching becomes a vital component of global cybersecurity resilience.
Organizations are encouraged to visit the Microsoft Release Health dashboard and the Microsoft Update Catalog immediately to download the necessary patches. Administrators should prioritize Domain Controllers first, followed by Windows Server 2025 instances that have shown installation failures, ensuring that all recovery keys are documented before proceeding with the deployment.




