Skip to content
Bleeping Computer

Microsoft fixes Windows Autopatch bug installing restricted drivers


Microsoft has fixed a Windows Autopatch bug that caused driver updates restricted by administrative policies to be deployed on some Autopatch-managed Windows devices in the European Union.

According to a service alert first spotted by Microsoft MVP Susan Bradley, the issue affected only a limited number of devices running client Windows platforms (i.e., Windows 11 25H2, Windows 11 24H2, and Windows 11 23H2).

Microsoft says that impacted Windows devices installed recommended driver updates without user approval, even when driver policies configured by IT admins required manual approval.

Affected systems also experienced unexpected behavior, including reboots and, in some cases, system failures, depending on the installed drivers.

The company added that a service-side fix addressed the bug and that customers don’t have to take any action to resolve it.

“A limited subset of devices managed by Windows Autopatch in the European Union (EU) region might have received unexpected driver updates from Windows Update, despite administrative policies configured to restrict driver deployment,” Microsoft said.

“This issue has been fixed through a service-side fix. No client-side updates or further action are required from customers.”

Last month, Microsoft resolved another known issue that was causing systems running Windows Server 2019 and 2022 to upgrade to Windows Server 2025 “unexpectedly.”

Microsoft first acknowledged the issue in September 2024, after widespread reports from Windows admins about servers being upgraded overnight to a Windows Server version for which they didn’t even have a license.

On Tuesday, it also confirmed that some customers are experiencing issues installing Office on their Windows 365 devices due to a configuration change introduced by a recent service update.

article image

AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

Claim Your Spot



Source link