Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions

Posted on September 4, 2025September 4, 2025 By CWS

Microsoft has formally acknowledged a major bug in latest Home windows safety updates that’s inflicting software set up and restore failures throughout a number of variations of Home windows 10, Home windows 11, and Home windows Server.

The difficulty stems from a safety enhancement within the August 2025 updates, which now incorrectly triggers Consumer Account Management (UAC) prompts for traditional, non-administrator customers making an attempt to run routine software operations.

The issue was launched with the safety replace KB5063878, launched on August 12, 2025, and persists in later updates.

This replace was designed to patch a high-severity elevation of privilege vulnerability within the Home windows Installer, tracked as CVE-2025-50173.

Whereas the repair efficiently addressed the safety flaw, it had an unintended aspect impact: it now enforces administrator-level permissions for Home windows Installer (MSI) restore and associated capabilities that beforehand ran seamlessly for traditional customers. In consequence, customers with out admin rights are encountering sudden UAC prompts.

Suppose they can not present administrator credentials, a standard state of affairs in company and academic environments. In that case, the operation fails, typically with an “Error 1730,” which signifies the consumer lacks the required entry rights.

The bug impacts a number of widespread situations, together with:

Operating MSI restore instructions like msiexec /fu

Launching purposes that carry out a self-repair or preliminary consumer configuration, equivalent to Autodesk merchandise together with AutoCAD, Civil 3D, and Inventor CAM.

Putting in purposes that configure themselves on a per-user foundation.

Deploying software program packages by means of Microsoft Configuration Supervisor (ConfigMgr).

The difficulty is especially disruptive for organizations that depend on multi-user gadgets, equivalent to college laptop labs and shared workstations inside enterprises.

IT directors reported that purposes utilizing a “secondary” MSI installer for per-user setup are often affected.

One college IT administrator famous, “We’ve got a number of purposes behaving this manner, not simply these from Autodesk. All software program operating a secondary MSI installer does this habits.”

Mitigations

Microsoft has formally documented the difficulty and supplied momentary options whereas a everlasting repair is being developed.

For particular person customers who can, the fast workaround is to right-click the applying and choose “Run as administrator”.

For managed IT environments, Microsoft has made a Identified Problem Rollback (KIR) accessible. This permits directors to revert the particular change inflicting the UAC prompts by deploying a particular Group Coverage.

Nevertheless, acquiring this KIR requires contacting Microsoft Assist for enterprise immediately. Microsoft strongly advises in opposition to different workarounds, equivalent to disabling associated safety features.

The corporate has said it’s engaged on a long-term resolution that will probably be launched in a future Home windows replace.

This repair will goal to permit directors to specify which purposes are permitted to carry out MSI restore operations with out triggering a UAC immediate.

The bug impacts a variety of platforms, together with a number of variations of Home windows 10 and 11, in addition to Home windows Server editions from 2012 to 2025.

Home windows and Home windows Server variations are affected by the Consumer Account Management (UAC) bug:

Working SystemAffected VersionsClientWindows 11, model 24H2Windows 11, model 23H2Windows 11, model 22H2Windows 10, model 22H2Windows 10, model 21H2Windows 10, model 1809Windows 10 Enterprise LTSC 2019Windows 10 Enterprise LTSC 2016Windows 10, model 1607Windows 10 Enterprise 2015 LTSBServerWindows Server 2025Windows Server 2022Windows Server, model 1809Windows Server 2019Windows Server 2016Windows Server 2012 R2Windows Server 2012

Discover this Story Attention-grabbing! Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:App, Breaks, Bug, Confirms, Install, Microsoft, UAC, Versions, Windows

Post navigation

Previous Post: Threat Actors Using Stealerium Malware to Attack Educational Organizations
Next Post: Wytec Expects Significant Financial Loss Following Website Hack

Related Posts

Threat Actors Using Stealerium Malware to Attack Educational Organizations Cyber Security News
HashiCorp Nomad Vulnerability Allows Privilege Escalation via ACL Policy Lookup Exploit Cyber Security News
Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code Cyber Security News
New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control Cyber Security News
Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence Cyber Security News
Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
  • US Offers $10 Million for Three Russian Energy Firm Hackers
  • Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams
  • Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts
  • US, Allies Push for SBOMs to Bolster Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products
  • US Offers $10 Million for Three Russian Energy Firm Hackers
  • Sola Security Raises $35M to Bring No-Code App Building to Cybersecurity Teams
  • Hackers Leverage X’s Grok AI To Amplify Malicious Links Via Promoted Posts
  • US, Allies Push for SBOMs to Bolster Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News