Security & privacy

Microsoft's April patch puts Windows domain controllers into reboot loops — third known issue from KB5082063

At a glance:

  • April 2026 Windows Server update KB5082063 causes LSASS crashes on non‑Global Catalog domain controllers.
  • The bug forces continuous reboots, breaking Active Directory authentication in Privileged Access Management (PAM) deployments.
  • Microsoft confirms this as the third known issue linked to the same patch.

What happened

Microsoft’s monthly security roll‑out for Windows Server, identified as KB5082063, was released in April 2026. Shortly after deployment, a subset of enterprise domain controllers—specifically those that are not configured as Global Catalog servers—began to experience repeated crashes of the Local Security Authority Subsystem Service (LSASS). The LSASS failure forces the operating system to reboot, creating a loop that can only be broken by removing the update or performing a full system restore.

The problem is confined to domain controllers that are part of Privileged Access Management (PAM) configurations. PAM relies on tightly controlled authentication pathways, and when LSASS terminates, the entire Active Directory authentication stack becomes unavailable. Administrators report that affected servers stop responding to login attempts, Group Policy updates, and any service that depends on Kerberos tickets, effectively halting day‑to‑day operations for the impacted organizations.

Impact on enterprises

Enterprises that have rolled out the April patch across their server farms are now scrambling to identify which controllers are non‑Global Catalog members. Because the issue does not affect Global Catalog servers, many large environments still retain at least one functional authentication point, but the loss of any PAM‑enabled controller can cripple privileged workflows, such as just‑in‑time elevation and credential vaulting.

The downtime has financial implications: organizations must allocate engineering resources to isolate the faulty servers, revert the update, and validate that directory services are fully restored. In sectors with strict compliance requirements—finance, healthcare, and government—the interruption could also trigger audit flags for unavailable authentication services during the incident window.

Microsoft’s response

Microsoft acknowledged the defect on its health dashboard, labeling it as the third known issue tied to KB5082063. The company has posted a temporary workaround: administrators should pause the update via Group Policy or WSUS for non‑Global Catalog domain controllers until a corrective build is issued. Microsoft’s engineering team is reportedly working on a revised package that addresses the LSASS crash without disabling the security fixes contained in the original patch.

In parallel, Microsoft recommends that affected customers capture crash dump files and submit them through the Windows Feedback Hub to accelerate root‑cause analysis. The firm also advises a review of PAM deployment topologies to ensure that at least one Global Catalog server remains available as a fallback authentication source.

What to watch next

The next patch cycle, slated for May 2026, is expected to include a fix for the LSASS instability. Enterprises should monitor the Microsoft Security Update Guide and the Windows Server release notes for the exact build number that resolves the issue. In the meantime, IT teams are urged to test the April update in isolated lab environments before mass deployment, especially when PAM is part of the security architecture.

Stakeholders are also watching for any broader implications on Microsoft’s patch‑testing pipeline. Repeated incidents within a single month could prompt a review of the internal validation processes that precede public roll‑outs, potentially leading to more staged or phased deployments for high‑risk server roles.

Editorial SiliconFeed is an automated feed: facts are checked against sources; copy is normalized and lightly edited for readers.

FAQ

Which servers are affected by the KB5082063 reboot issue?
The problem is limited to Windows Server domain controllers that are not configured as Global Catalog servers and are part of Privileged Access Management (PAM) deployments. These controllers experience LSASS crashes that trigger continuous reboots.
What immediate steps does Microsoft recommend for administrators?
Microsoft advises pausing the KB5082063 update for non‑Global Catalog domain controllers via Group Policy or WSUS, collecting LSASS crash dumps, and submitting them through the Windows Feedback Hub. Administrators should also ensure at least one Global Catalog server remains operational as a fallback.
When is a fix expected to be released?
Microsoft plans to include a corrective build in the May 2026 patch cycle. Customers should monitor the Windows Server release notes and the Security Update Guide for the specific build number that resolves the LSASS crash.

More in the feed

Prepared by the editorial stack from public data and external sources.

Original article