Microsoft has issued an emergency update for Windows 11 to tackle a widespread installation problem that has been vexing users. The update, identified as KB5086672, was made available on March 31, 2026, and is aimed at resolving issues affecting systems running Windows 11 versions 25H2 and 24H2.
Addressing the Installation Loop
The update is a response to a critical setup bug that emerged in late March, hindering users from implementing essential system updates and maintaining security protocols. The issue is linked to the non-security preview update, KB5079391, released on March 26. This update caused numerous devices to enter an installation loop, with error code 0x80073712, indicating missing or corrupted update files.
In light of these issues, Microsoft has withdrawn the problematic March 26 update to avoid further disruptions in system management.
Inside the Emergency Update
The KB5086672 update functions as a comprehensive package incorporating previous security and quality improvements from earlier updates in March. It integrates fixes from updates released on March 10 and March 21, addressing the setup bug permanently and advancing the system builds to versions 26200.8117 and 26100.8117.
In addition to the core fixes, the update enhances several AI components, essential for accurate local data processing. These components, including the Image Search module and Content Extraction tool, received updates to version 1.2603.377.0.
Deployment and Management Strategies
For most users, acquiring this update is straightforward. Systems with the priority update feature enabled will receive the patch through standard update channels. Alternatively, users can manually download it by accessing their settings and checking for optional updates. The update is also available on the Microsoft Update Catalog for offline installations.
IT administrators and enterprise security teams managing larger networks should use Microsoft Intune or Windows Autopatch to expedite deployment. Rapid resolution of these update loops is vital to ensure that endpoints can receive future security patches without manual intervention.
This release includes the latest Servicing Stack Update to ensure a robust installation process. Security teams should note that rolling back the patch using the standard Windows Update Standalone Installer tool is not possible. Instead, the DISM command-line tool is needed for emergency removals.
Stay informed with us on Google News, LinkedIn, and X for the latest cybersecurity updates. Contact us to share your stories.
