Microsoft Addresses August 2025 Windows Security Updates: UAC Prompts Cause App Installation Issues for Non-Admin Users

Microsoft Addresses August 2025 Windows Security Updates: UAC Prompts Cause App Installation Issues for Non-Admin Users

User avatar placeholder
Written by Dave W. Shanahan

September 4, 2025

Microsoft Confirms App Install Issues Linked to August 2025 Windows Security Updates

Microsoft Addresses August 2025 Windows Security Updates: UAC Prompts Cause App Installation Issues for Non-Admin Users

Microsoft has acknowledged that the August 2025 Windows security updates have inadvertently caused application installation failures and an increase in unexpected User Account Control (UAC) prompts for non-administrator users. This development stems from a vital security patch aimed at addressing the privilege escalation vulnerability CVE-2025-50173—a flaw that previously allowed attackers to gain SYSTEM privileges if left unpatched.

What Is Happening?

Microsoft Addresses August 2025 Windows Security Updates: UAC Prompts Cause App Installation Issues for Non-Admin Users

According to Microsoft and a detailed report from Bleeping Computer, these security improvements are manifesting as new UAC prompts requiring admin credentials during specific interactive Windows Installer (MSI) operations. This behavior is occurring across all supported Windows client and server versions, including Windows 11 (versions 24H2, 23H2, 22H2), Windows 10 (version 22H2, 21H2, and others), and Windows Server 2025, 2022, 2019, 2016, and 2012 R2.

The new admin UAC prompt will typically appear under the following scenarios:

  • Running MSI repair commands (e.g., msiexec /fu)

  • Installing applications that set up per-user configurations

  • Executing Windows Installer during Active Setup

  • Deploying packages via Configuration Manager (ConfigMgr) that rely on user-specific advertising

  • Using apps such as Autodesk AutoCAD, Civil 3D, and Inventor CAM

  • Enabling Secure Desktop features

In short, many standard software installation, repair, or deployment scenarios—especially those involving enterprise software or management tools—are now being blocked for users who do not possess administrator permissions.

Root Cause: Patching CVE-2025-50173

The trigger for this shift is Microsoft’s initiative to clamp down on the CVE-2025-50173 Windows Installer vulnerability. This flaw, if exploited, could let authenticated attackers escalate privileges due to weak authentication in the Windows Installer service.

The August update (notably KB5063878) was designed to enforce stricter controls. Microsoft stated that the patched update now enforces UAC prompts for MSI repair and related actions. If a standard user accidentally or intentionally attempts such an operation without administrative rights, the attempt now fails—often with a clear error message (such as Error 1730, which prevents non-admin installation or configuration tasks).

Impact on Users, IT Admins, and Software Workflows

The consequences are being felt across a wide spectrum of Windows deployments:

  • End users may see installations break, especially for applications that quietly invoke MSI repair in the background or as part of user sessions.

  • Enterprise software deployment (including scripts and automated tools using Configuration Manager) can silently fail, requiring administrative intervention.

  • Engineers, architects, and creative professionals using tools like AutoCAD or Civil 3D may find app launches or updates unexpectedly blocked.

Temporary Workarounds and Mitigation Steps

Until a permanent fix is released, Microsoft and Bleeping Computer suggest the following temporary workarounds:

  • Manually run affected apps as Administrator: Right-click the application executable (or its shortcut) and select “Run as administrator” from the context menu. This action grants the app the elevated permissions required for installer actions.

  • IT admin action: Enable Known Issue Rollback (KIR): Organizations can temporarily roll back the problematic behavior by applying a special Group Policy using Microsoft’s Known Issue Rollback mechanism, available for Windows 11 (22H2, 23H2, 24H2), Windows 10 (21H2, 22H2), and Windows Server (2022, 2025). Microsoft advises contacting their business support team for guidance and policy files.

Upcoming Fixes and Related Issues

Microsoft is already developing an update to allow IT administrators to designate specific trusted apps that can perform MSI repair operations without the elevated UAC prompt. This update will help restore previous deployment workflows and ensure that mission-critical software updates or repairs can proceed without constant administrator approval.

Other Reported Bugs

In addition, Microsoft is addressing a separate issue caused by the August 2025 security updates, resulting in severe lag and stutter for users running NDI streaming software on Windows 10 and Windows 11. However, Microsoft clarified that these updates have no link to recent SSD or HDD failure and data corruption reports associated with the August security update KB5063878.

Windows 11 24H2: Context for Security and Performance Enhancements

Amid these short-term troubles, the Windows 11, version 24H2 update otherwise brings noteworthy improvements:

  • Enhanced security architecture

  • Faster update servicing

  • Performance optimizations

  • Fixes for sign-in delays on new devices

These changes reflect a broad push toward making Windows deployments more stable and resilient, even as they occasionally introduce transitional friction for end users and administrators.

Security always comes with tradeoffs, and the Microsoft August 2025 security updates are a clear example. While effectively closing a dangerous privilege escalation vulnerability, the new requirements have temporarily complicated the daily workflows of millions, especially those without administrative privileges. IT teams should watch for Microsoft’s forthcoming fix and temporarily adopt the suggested workarounds to ensure continued productivity. For any impact related to software deployment, automated installations, or UAC prompts, verify your environment against the affected versions and consider consultation with Microsoft support.

Windows users, IT departments, and enterprise software managers should remain vigilant for further announcements as Microsoft pushes out its next round of crucial updates to resolve this issue.


Discover more from Microsoft News Now

Subscribe to get the latest posts sent to your email.

Image placeholder

I'm Dave W. Shanahan, a Microsoft enthusiast with a passion for Windows 11, Xbox, Microsoft 365 Copilot, Azure, and more. After OnMSFT.com closed, I started MSFTNewsNow.com to keep the world updated on Microsoft news. Based in Massachusetts, you can find me on Twitter @Dav3Shanahan or email me at davewshanahan@gmail.com.