Microsoft Patch Tuesday Aftermath: 107 CVEs Fixed, Windows Reset Features Still Broken

August Patch Tuesday fixes 107 CVEs incl. a publicly disclosed Kerberos zero‑day—but KB5063709/related updates broke Windows reset.

 

A SOC dashboard with patch rollout charts and bold text displaying "107 CVEs - Zero-Day," rendered in a teal and amber color scheme

Breaking Brief

  • Microsoft’s August 2025 Patch Tuesday addressed 107 CVEs, including one publicly disclosed zero‑day in Windows Kerberos and 13 Critical flaws; vulnerability mix skews enterprise with heavy elevation‑of‑privilege and RCE exposure.crowdstrike+1

  • Post‑patch fallout continues: the August client updates (e.g., KB5063709/KB5063875 lines) broke Windows “Reset this PC” and recovery operations across Windows 10 and older Windows 11 builds; Microsoft acknowledged the issue and shipped out‑of‑band updates, but organizations still report incomplete remediation in some estates.bleepingcomputer+1

CVE Landscape at a Glance

  • Totals and severity: 107 CVEs fixed; 13 Critical; 91 Important; 1 Moderate; 1 Low.tenable

  • Category split (CrowdStrike): 42 elevation of privilege (~39%), 35 remote code execution (~33%), 16 information disclosure (~15%).crowdstrike

  • Zero‑day: CVE‑2025‑53779, a Windows Kerberos elevation‑of‑privilege issue publicly disclosed pre‑patch; risk centers on domain privilege escalation via constrained attribute abuse.qualys+1

What’s Still Broken

  • Known issue: Installing August security updates causes reset/recovery failures: Reset my PC (keep files), Fix problems using Windows Update, and RemoteWipe CSP operations may fail on affected client platforms.bleepingcomputer

  • Scope: Windows 11 22H2/23H2 (KB5063875) and Windows 10 22H2, LTSC 2021/2019 lines (KB5063709/KB5063877) were impacted; Microsoft has released emergency OOB fixes but estates may need coordination to fully recover functionality.bleepingcomputer+1

Enterprise Patch Priorities

  • Tier‑0 first: Patch domain controllers and identity infrastructure (Kerberos/NTLM/LSASS surfaces) to contain privilege escalation blast radius tied to the publicly disclosed zero‑day.bleepingcomputer+1

  • Internet‑exposed roles: RDP/MSMQ/share services and Office/SharePoint paths with RCE potential should be next in line; reduce attack surface while rolling out.tenable+1

  • Hosts and clusters: Hyper‑V and core server roles in staggered waves with health checks (cluster‑aware patching where applicable).tenable

Rollout Timeline (ring‑based)

  • Day 0: Canary DCs, RDP/MSMQ/SharePoint edge roles, 5–10% pilot clients; enable enhanced monitoring for auth anomalies and service stability.bleepingcomputer+1

  • Day 1–2: Remaining DCs per site, exposed servers, 25–30% client cohort; validate line‑of‑business apps.tenable

  • Day 3–5: Broad server/client rollout; handle stubborn KB installs via standalone packages.tenable

Testing Checklist

  • Identity flows: Kerberos/NTLM auth, SSO, and line‑of‑business logons; watch for spikes in 4769/4771 and 4672 adjacencies.crowdstrike+1

  • Service paths: RDP broker health, MSMQ queue depth, Office/SharePoint upload/render; graphics pipeline smoke tests where applicable.tenable

  • Client UX: VPN, printing, and Teams calls; capture early regressions before scaling.rapid7

Recovery/Reset Workarounds and Fix Path

  • Apply OOB fixes: Deploy Microsoft’s emergency updates that remediate Reset/Recovery breakage corresponding to affected KB lines (KB5063875/KB5063709/KB5063877).bleepingcomputer

  • If still failing: Use WinRE/media‑based repair, DISM image health restore, or in‑place upgrade repair; postpone fleet‑wide resets until OOB patches are confirmed on endpoints.bleepingcomputer

  • RemoteWipe impact: For MDM‑driven wipes, validate on a pilot ring post‑OOB before executing at scale; maintain alternate wipe workflows (PXE or vendor imaging) as contingency.bleepingcomputer+1

Rollback Procedures (when an update breaks ops)

  • Client rollback: Use Settings > Update history > Uninstall updates to remove the offending KB on impacted pilots; pause updates temporarily only for affected rings while testing OOB fixes.bleepingcomputer

  • Server rollback: Evict/pause cluster node, uninstall the KB, reboot, validate services, then rotate to the next node; keep last month’s cumulative ready as fallback.tenable

  • KIR and feature holds: Where Known Issue Rollback applies, deploy relevant policies; defer feature updates during security rollout to reduce variable interactions.rapid7

Detection During Rollout

  • EoP monitoring: Alert on 4624 Type 2/10 followed by 4672 within 5 minutes on the same host; unusual admin group membership changes post‑patch.crowdstrike

  • Kerberos anomalies: Bursts in 4769/4771 or requests to rare SPNs; investigate systems lagging on Kerberos fixes.bleepingcomputer

  • Service health: Spike in RDP broker errors/MSMQ retries after patching; early warning for regression or configuration drift.tenable

more blog alfaiznova.com
Alfaiz Ansari is a digital strategist and researcher specializing in Cybersecurity, Artificial Intelligence, and Digital Marketing. As the mind behind Alfaiznova.com, he combines technical expertise …