Applies To
Windows Server, version 23H2

Release Date:

8/12/2025

Version:

OS Build 25398.1791

Windows Secure Boot certificate expirationImportant: Secure Boot certificates used by most Windows devices are set to expire starting in June 2026. This might affect the ability of certain personal and business devices to boot securely if not updated in time. To avoid disruption, we recommend reviewing the guidance and taking action to update certificates in advance. For details and preparation steps, see Windows Secure Boot certificate expiration and CA updates.

To learn more about Windows update terminology, see types of Windows updates and monthly quality update types. For an overview, see the update history page for Windows Server, version 23H2.

Improvements 

This security update contains fixes and quality improvements from KB5062570 (released July 8, 2025). The following summary outlines key issues addressed by the KB update after you install it. Also, included are available new features. The bold text within the brackets indicates the item or area of the change.

  • [Input (know issue)] Fixed: An issue when using the Microsoft Changjie IME (input method editor) for Traditional Chinese might cause problems such as not being able to form or select words, unresponsive spacebar or blank key, incorrect word output, or a broken candidate window display. This can occur after installing KB5062570.

For more information about security vulnerabilities, see the Security Update Guide and the August 2025 Security Updates. 

Windows Server, version 23H2 servicing stack update (KB5062685) - 25398.1720

This update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates. To learn more about SSUs, see Simplifying on-premises deployment of servicing stack updates.

Known issues in this update​​​​​​​

Symptoms

A security improvement was included in the August 2025 Windows security update and later updates to enforce the requirement that User Account Control (UAC) prompt for administrator credentials when performing Windows Installer (MSI) repair and related operations. This improvement addressed security vulnerability CVE-2025-50173.

After installing the update, standard users might see a User Account Control (UAC) prompt in several scenarios. 

  • Running MSI repair commands (such as msiexec /fu).

  • Opening Autodesk apps, including some versions of AutoCAD, Civil 3D and Inventor CAM, or when installing an MSI file after a user signs into the app for the first time.

  • Installing apps that configure per user.

  • Running Windows Installer during Active Setup.

  • Deploying packages through Manager Configuration Manager (ConfigMgr) that rely on user-specific "advertising" configurations.

  • Enabling Secure Desktop.

If a standard user runs an app that initiates an MSI repair operation without displaying UI, it will fail with an error message. For example, installing and running Office Professional Plus 2010 as a standard user will fail with Error 1730 during the configuration process.

Workaround

The following workarounds are available:

  • ​​​​​​​Run the app as an administrator (right-click the app from Start or Search, then select Run as administrator).

  • If standard users can’t run apps as administrators, IT admins can apply a special Group Policy using Known Issue Rollback (KIR) to fix the issue on Windows Server 2025, Windows Server 2022, Windows 11 (versions 22H2, 23H2, 24H2), and Windows 10 (versions 21H2, 22H2). To apply this fix, contact Microsoft Support for business. Avoid using other workarounds like disabling related features.

We are working to address this issue by allowing IT admins to permit specific apps to perform MSI repair operations without UAC prompts. This improvement will be released in a future Windows update, and details will be provided as they become available.

How to get this update

Before you install this update

Microsoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.

Install this update

To install this update, use one of the following Windows and Microsoft release channels.

Available

Next Step

Included

None. This update will be downloaded and installed automatically from Windows Update and Microsoft Update.

If you want to remove the LCU

To remove the LCU after installing the combined SSU and LCU package, use the DISM/Remove-Package command line option with the LCU package name as the argument. You can find the package name by using this command: DISM /online /get-packages.

Running Windows Update Standalone Installer (wusa.exe) with the /uninstall switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.

File Information 

For a list of the files provided in this update, download the file information for cumulative update 5063899.

For a list of the files provided in the servicing stack update, download the file information for the SSU (KB5062685) - version 25398.1720. 

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.