{"id":22931,"date":"2022-01-12T11:08:23","date_gmt":"2022-01-12T10:08:23","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=22931"},"modified":"2022-01-13T18:34:55","modified_gmt":"2022-01-13T17:34:55","slug":"windows-server-januar-2022-sicherheitsupdates-verursachen-boot-schleife","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/01\/12\/windows-server-januar-2022-sicherheitsupdates-verursachen-boot-schleife\/","title":{"rendered":"Windows Server: January 2022 security updates are causing DC boot loop"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2022\/01\/12\/windows-server-januar-2022-sicherheitsupdates-verursachen-boot-schleife\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]I'll pull it out separately as a blog post. Administrators of Windows Domain Controllers should be careful about installing the January 2022 security updates. I have now received numerous reports that Windows servers acting as domain controllers will not boot afterwards. Lsass.exe (or wininit.exe) triggers a blue screen with the stop error 0xc0000005. It can hit all Windows Server versions that act as domain controllers, according to my estimation.<\/p>\n<p><!--more--><\/p>\n<h2>January 2022 updates address Active Directory bug<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg09.met.vgwort.de\/na\/b2d1f92586a84b06a3b807c23c55e65f\" alt=\"\" width=\"1\" height=\"1\" \/>I listed it in the Patchday blog posts linked at the end of the article. In all the security updates for Windows Server (e.g., Update <a href=\"https:\/\/support.microsoft.com\/help\/5009624\" target=\"_blank\" rel=\"noopener\">KB5009624<\/a> (Monthly Rollup for Windows 8.1 and Windows Server 2012 R2)), it states:<\/p>\n<blockquote><p>Addresses a Windows Server issue in which Active Directory attributes are not written correctly during a Lightweight Directory Access Protocol (LDAP) modify operation with multiple specific attribute changes.<\/p><\/blockquote>\n<p>However, something seems to have gone wrong, because the security update can trigger a boot loop on Windows servers that act as domain controllers.<\/p>\n<h2>Boot loop on Windows Server DCs<\/h2>\n<p>German blog reader John L. contacted me via email back on January 11, 2022, and pointed out a fat problem related to the update. The module lsass.exe, version: 6.3.9600.17415, triggers an error 0xc00005 (access violation) via the library msv1_0.DLL, version: 6.3.9600.20239, so that the server gets into a boot loop.<\/p>\n<blockquote><p>\"\"Name of the corrupt application: lsass.exe, version: 6.3.9600.17415, timestamp: 0x545042fe<br \/>\nName of the corrupt module: msv1_0.DLL, version: 6.3.9600.20239, timestamp: 0x61c1a5c8<br \/>\nException Code: 0xc0000005<br \/>\nFehleroffset: 0x0000000000002663<br \/>\nID of the faulty process: 0x1f4<br \/>\nStart time of the faulty application: 0x01d8072ac5b2c15a<br \/>\nPath of the faulty application: C:\\Windows\\system32\\lsass.exe<br \/>\nPath of the corrupted module: C:\\Windows\\system32\\msv1_0.DLL<br \/>\nBerichtskennung: afc36fda-7320-11ec-813a-00155d012601<br \/>\nFull name of the corrupted package:<br \/>\nApplication ID relative to the corrupted package: \"\".<\/p><\/blockquote>\n<p>I had already addressed this in the blog post <a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/patchday-windows-8-1-server-2012-r2-updates-11-januar-2022-mgliche-boot-probleme\/\">Patchday: Windows 8.1\/Server 2012 R2 Updates (January 11, 2022), boot loop reported<\/a>, possible boot issues. John had the following advice:<\/p>\n<blockquote><p>I want to advise against rolling back snapshots, especially on DC's, so as not to provoke USN rollbacks.<\/p>\n<p>Workaround: prevent one of the two DC's from booting, then uninstall today's hotfixes first on one and then on the other DC.<\/p><\/blockquote>\n<p>In the comments of my blog post above (and its German counterpart), other blog readers confirm this problem. The workaround is, to uninstall the January 11, 2022 security update.<\/p>\n<blockquote><p><strong>Tip:<\/strong> To avoid that the DC restarts too quickly during uninstall, just deactivate the network connection (pull the plug or deactivate the network driver).<\/p><\/blockquote>\n<p>German blog reader MOM20xx had the boot loop even after uninstalling the update and <a href=\"https:\/\/www.borncity.com\/blog\/2022\/01\/12\/patchday-windows-8-1-server-2012-r2-updates-11-januar-2022-mgliche-boot-probleme\/#comment-120043\" target=\"_blank\" rel=\"noopener\">notes<\/a> that the security-only update KB5009595 should also be uninstalled on the domain controllers.<\/p>\n<h2>Probably affects all versions of Windows Server DCs<\/h2>\n<p>German blog reader Simon wrote in <a href=\"https:\/\/www.borncity.com\/blog\/2022\/01\/12\/patchday-windows-8-1-server-2012-r2-updates-11-januar-2022-mgliche-boot-probleme\/#comment-120072\" target=\"_blank\" rel=\"noopener\">this comment<\/a> that it also affects Windows Server 2016\/2019 Domain Controllers too. He then posted the following dump excerpt.<\/p>\n<blockquote><p>The process wininit.exe has initiated the restart of computer DC on behalf of user for the following reason: No title for this reason could be found<br \/>\nReason Code: 0x50006<br \/>\nShutdown Type: restart<br \/>\nComment: The system process 'C:\\Windows\\system32\\lsass.exe' terminated unexpectedly with status code -1073741819. The system will now shut down and restart.<\/p>\n<p>Faulting application name: lsass.exe, version: 10.0.14393.4704, time stamp: 0x615be0cd<br \/>\nFaulting module name: lsadb.dll, version: 10.0.14393.4886, time stamp: 0x61d5242f<br \/>\nException code: 0xc0000005<br \/>\nFault offset: 0x000000000001be5b<br \/>\nFaulting process id: 0x2a8<br \/>\nFaulting application start time: 0x01d8077b1080a9da<br \/>\nFaulting application path: C:\\Windows\\system32\\lsass.exe<br \/>\nFaulting module path: C:\\Windows\\system32\\lsadb.dll<br \/>\nReport Id: e14067b5-aac7-46a4-9e21-cc45371c522a<br \/>\nFaulting package full name:<br \/>\nFaulting package-relative application ID:<\/p><\/blockquote>\n<p>So there <em>wininit.exe<\/em> triggers the error 0xc0000005 on the domain controller. I also have another feedback on Facebook that update KB5008873 on Windows Server 2019 is causing the restart of the AD controllers (the AD controller is restarted every 15 minutes).<\/p>\n<p><img decoding=\"async\" title=\"Boot-Loop bei Windows Server 2019\" src=\"https:\/\/i.imgur.com\/qkr3SQD.png\" alt=\"Boot-Loop bei Windows Server 2019\" \/><br \/>\nBoot-Loop on Windows Server 2019<\/p>\n<p>If anyone needs some more hints on how to uninstall the update in a Windows PE environment, I'll refer them to <a href=\"https:\/\/www.repairwin.com\/how-to-remove-updates-from-windows-recovery-environment-winre\/\" target=\"_blank\" rel=\"noopener\">How to Remove Updates from Windows Recovery Environment (WinRE)<\/a>.<\/p>\n<blockquote><p><strong>Note:<\/strong> According to <a href=\"https:\/\/www.borncity.com\/blog\/2022\/01\/11\/microsoft-security-update-summary-11-januar-2022\/#comment-120048\" target=\"_blank\" rel=\"noopener\">this German comment<\/a>, update KB5009543 causes problems with L2TP VPNs. On reddit.com there is <a href=\"https:\/\/www.reddit.com\/r\/sysadmin\/comments\/s1oqv8\/kb5009543_january_11_2022_breaks_l2tp_vpn\/\" target=\"_blank\" rel=\"noopener\">this thread<\/a> about it. See also the links below.<\/p>\n<p>In addition, I got <a href=\"https:\/\/www.borncity.com\/blog\/2022\/01\/12\/patchday-windows-8-1-server-2012-r2-updates-11-januar-2022-mgliche-boot-probleme\/#comment-120077\" target=\"_blank\" rel=\"noopener\">reports<\/a> that VMs on Server 2012 R2 Hypervisor do not start anymore. The error message is that the hypervisor is not running: Hypervisor launch failed; The operating systems boot loader failed with error 0xC00000BB. This is probably update KB5009624 for Server 2012 R2 &#8211; just as a hint, if there should be problems under Windows Server 2016 &#8211; 2019. See also the links below.<\/p>\n<p>And we have reports, that the Windows Server 2012 R2 January 11, 2022 security update removes ReFS support.<\/p><\/blockquote>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2022\/01\/05\/microsoft-office-updates-4-januar-2022\/\">Microsoft Office Updates (January 4, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/11\/microsoft-security-update-summary-11-januar-2022\/\">Microsoft Security Update Summary (January 11, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/patchday-windows-8-1-server-2012-r2-updates-11-januar-2022-mgliche-boot-probleme\/\">Patchday: Windows 8.1\/Server 2012 R2 Updates (January 11, 2022), boot loop reported<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/patchday-windows-10-updates-11-januar-2022\/\">Patchday: Windows 10 Updates (January 11, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/patchday-windows-11-updates-11-januar-2022\/\">Patchday: Windows 11 Updates (January 11, 2022)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/patchday-updates-fr-windows-7-server-2008-r2-11-januar-2022\/\">Patchday: Updates for Windows 7\/Server 2008 R2 (January 11, 2022)<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/windows-server-januar-2022-sicherheitsupdates-verursachen-boot-schleife\/\">Windows Server: January 2022 security updates are causing DC boot loop<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/windows-vpn-verbindungen-l2tp-over-ipsec-nach-januar-2022-update-kaputt\/\">Windows VPN connections (L2TP over IPSEC) broken after January 2022 update<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/windows-server-2012-r2-januar-2022-update-kb5009586-brickt-hyper-v-host\/\" rel=\"bookmark\">Windows Server 2012\/R2: January 2022 Update KB5009586 bricks Hyper-V Host<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]I'll pull it out separately as a blog post. Administrators of Windows Domain Controllers should be careful about installing the January 2022 security updates. I have now received numerous reports that Windows servers acting as domain controllers will not boot &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/01\/12\/windows-server-januar-2022-sicherheitsupdates-verursachen-boot-schleife\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[463,1547,22,2],"tags":[47,2700,69,195,159],"class_list":["post-22931","post","type-post","status-publish","format-standard","hentry","category-issue","category-software","category-update","category-windows","tag-issue","tag-patchday-1-2022","tag-security","tag-update","tag-windows-server"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=22931"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22931\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=22931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=22931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=22931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}