Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Confirms Recent Windows 11 24H2/25H2 and Server 2025 Update Breaks RemoteApp Connections

Posted on December 18, 2025December 18, 2025 By CWS

Microsoft has formally acknowledged a disruptive bug in its newest Home windows updates, confirming that the November 2025 non-security preview replace KB5070311 (OS builds 26200.7309 and 26100.7309) and subsequent patches are inflicting RemoteApp connection failures in Azure Digital Desktop (AVD) environments.

The difficulty primarily impacts enterprise customers operating Home windows 11 variations 24H2 and 25H2, in addition to Home windows Server 2025, however doesn’t have an effect on all desktop periods.

Affected organizations report that RemoteApp streams designed to publish particular person functions by way of AVD fail to attach after the replace.

This stems from adjustments to Distant Desktop Protocol (RDP) shell dealing with, triggered by putting in KB5070311 on December 1, 2025. Dwelling and Professional customers on private gadgets face minimal threat, as AVD deployment is uncommon exterior enterprise settings.

“People utilizing Home windows Dwelling or Professional editions… are most unlikely to expertise this difficulty,” Microsoft said in its assist advisory. Enterprise IT groups, nonetheless, are scrambling, as disruptions are affecting virtualized workloads that depend on RemoteApp for safe app supply.

Microsoft urges quick workarounds.

Possibility 1 entails handbook registry edits: Launch an elevated Command Immediate and run

reg add “HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinLogonShellProgramsRdpShell.exe” /v “ShouldStartRailRPC” /t REG_DWORD /d 1 /f,

then restart. Customers should again up the registry first to keep away from broader instability.

Possibility 2 leverages Identified Problem Rollback (KIR), Microsoft’s automated mitigation instrument. For Professional and Enterprise gadgets that replace instantly from Microsoft, the repair rolls out mechanically, although it might take as much as 24 hours from December 12, 2025, 6:00 PM PT.

A tool restart accelerates deployment. Enterprise admins managing updates by way of IT insurance policies can deploy a focused Group Coverage utilizing the MSI package deal KB5072033_25121301401. Configure underneath Laptop Configuration > Administrative Templates, then restart affected programs.

Impacted organizations can verify the Azure Portal underneath Messages ID: Q_P4-HFG for tailor-made insights. Microsoft guarantees a everlasting repair in an upcoming replace, after which workarounds may be eliminated.

This incident underscores ongoing challenges with Home windows replace reliability in hybrid cloud environments. As enterprises lean on AVD for zero-trust app entry, such breaks may expose operational dangers amid rising RDP-targeted assaults. IT execs ought to monitor the Microsoft KB5070311 web page and the AVD RemoteApp docs.

AI-Powered ISO 27001, SOC 2, NIST, NIS 2, and GDPR Compliance Guidelines => Begin for Free

Cyber Security News Tags:24H225H2, Breaks, Confirms, Connections, Microsoft, RemoteApp, Server, Update, Windows

Post navigation

Previous Post: RansomHouse RaaS Service Upgraded with Double Extortion Strategy that Steals and Encrypt Data
Next Post: Cisco Unified Contact Center Express Vulnerabilities Enables Remote Code Execution Attacks

Related Posts

Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof Cyber Security News
Cloudflare Outage Hits Internet with 500 Internal Server Error Cyber Security News
New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression Cyber Security News
CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices Cyber Security News
Hackers Infiltrate VS Code Marketplace with 19 Malicious Extensions Posing as PNG File Cyber Security News
CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls
  • New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
  • China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware
  • Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays
  • INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls
  • New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
  • China-Aligned APT Hackers Exploit Windows Group Policy to Deploy Malware
  • Amazon Catches North Korean IT Worker by Tracking Tiny 110ms Keystroke Delays
  • INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark