Microsoft Issues Emergency "Fix for the Fix" to Halt Windows Server Reboot Loops

Share
Minimalist vector art of a Windows server rack in an infinite reboot loop being fixed by a purple wrench.

An out-of-band update arrives days after the April Patch Tuesday release triggered critical LSASS crashes and BitLocker recovery prompts across enterprise domain controllers.

REDMOND, WA — Microsoft has released a series of emergency out-of-band (OOB) updates to address a cascade of failures introduced by its April 2026 "Patch Tuesday" cycle. The emergency intervention comes after sysadmins worldwide reported that KB5082063 (and related server updates) sent Windows Domain Controllers into a "death loop" of infinite restarts, effectively paralyzing corporate authentication services.

The primary culprit is a critical regression in the Local Security Authority Subsystem Service (LSASS), the core process responsible for enforcing security policies and handling user logins.

Emergency Update Reference

Server Version Emergency Fix (OOB)
Windows Server 2025 KB5091157 (Addresses Reboots & Install Failures)
Windows Server 2022 KB5091575 (Addresses Reboot Loops)
Windows Server 2019 KB5091573 (Addresses Reboot Loops)

The LSASS "Death Loop" Explained

The instability specifically targets Domain Controllers (DCs) in complex environments, particularly those utilizing Privileged Access Management (PAM).

According to technical bulletins from The Register and BleepingComputer, the bug causes LSASS to crash immediately upon startup if the server processes authentication requests too early in the boot sequence. Because Windows cannot operate safely without a stable LSASS process, the system triggers a protective hard restart, creating a recursive reboot loop that renders the DC — and often the entire domain — unavailable.

Beyond the reboot loops, administrators also reported:

  • Installation Failures: Some Windows Server 2025 systems were unable to install the April update entirely, throwing error codes like 0x800F0983.
  • BitLocker Alerts: A separate "known issue" forced enterprise servers into BitLocker recovery mode, requiring manual entry of 48-digit recovery keys after the update.

The Remediation: KB5091157

Microsoft’s rapid response involves a "non-security cumulative update" designed to stabilize the platform. The primary fix for Windows Server 2025 is identified as KB5091157.

Crucially, this is an Out-of-Band (OOB) release, meaning it will not be pushed automatically via Windows Update for all users. Administrators must manually pull the update from the Microsoft Update Catalog or deploy it via WSUS (Windows Server Update Services).


The CyberSignal Analysis

Signal 01 — The "Patch-to-Outage" Pipeline

This incident is a stark "Signal" for operational resilience. When a security patch becomes the primary cause of a service outage, the "prevention" mindset has failed. For B2B leaders, this highlights the necessity of Staged Deployment. In 2026, the risk of an unpatched vulnerability must be weighed against the risk of an unstable patch. If your organization's identity & access management (IAM) rests on a single point of failure like a Domain Controller, a botched update is as damaging as a ransomware attack.

Signal 02 — The Complexity of Modern Auth

The fact that this bug specifically hit PAM and multi-domain forests is a "Signal" that our identity stacks are becoming too "brittle." As we noted in our Account Takeover (ATO) Prevention Guide, complexity is the enemy of security. Microsoft’s need for a "fix for a fix" suggests that even the vendors are struggling to validate how core security processes (LSASS) interact with advanced identity features in real-world environments.


Sources

Type Source
Official Support Microsoft: KB5091157 OOB Documentation
Security News BleepingComputer: Emergency Fix Analysis
Tech Editorial The Register: "Out-of-band or Out-of-control?"
Admin Intel NotebookCheck: KB5082063 Fix Details
Community PSA Reddit: Sysadmin Reboot Loop Thread

Read more