Microsoft Confirms App Install Issues Linked to August 2025 Windows Security Updates

Microsoft has acknowledged that the August 2025 Windows security updates have inadvertently caused application installation failures and an increase in unexpected User Account Control (UAC) prompts for non-administrator users. This development stems from a vital security patch aimed at addressing the privilege escalation vulnerability CVE-2025-50173—a flaw that previously allowed attackers to gain SYSTEM privileges if left unpatched.
What Is Happening?

According to Microsoft and a detailed report from Bleeping Computer, these security improvements are manifesting as new UAC prompts requiring admin credentials during specific interactive Windows Installer (MSI) operations. This behavior is occurring across all supported Windows client and server versions, including Windows 11 (versions 24H2, 23H2, 22H2), Windows 10 (version 22H2, 21H2, and others), and Windows Server 2025, 2022, 2019, 2016, and 2012 R2.
The new admin UAC prompt will typically appear under the following scenarios:
-
Running MSI repair commands (e.g.,
msiexec /fu) -
Installing applications that set up per-user configurations
-
Executing Windows Installer during Active Setup
-
Deploying packages via Configuration Manager (ConfigMgr) that rely on user-specific advertising
-
Using apps such as Autodesk AutoCAD, Civil 3D, and Inventor CAM
-
Enabling Secure Desktop features
In short, many standard software installation, repair, or deployment scenarios—especially those involving enterprise software or management tools—are now being blocked for users who do not possess administrator permissions.
Root Cause: Patching CVE-2025-50173
The trigger for this shift is Microsoft’s initiative to clamp down on the CVE-2025-50173 Windows Installer vulnerability. This flaw, if exploited, could let authenticated attackers escalate privileges due to weak authentication in the Windows Installer service.
The August update (notably KB5063878) was designed to enforce stricter controls. Microsoft stated that the patched update now enforces UAC prompts for MSI repair and related actions. If a standard user accidentally or intentionally attempts such an operation without administrative rights, the attempt now fails—often with a clear error message (such as Error 1730, which prevents non-admin installation or configuration tasks).
Impact on Users, IT Admins, and Software Workflows
The consequences are being felt across a wide spectrum of Windows deployments:
-
End users may see installations break, especially for applications that quietly invoke MSI repair in the background or as part of user sessions.
-
Enterprise software deployment (including scripts and automated tools using Configuration Manager) can silently fail, requiring administrative intervention.
-
Engineers, architects, and creative professionals using tools like AutoCAD or Civil 3D may find app launches or updates unexpectedly blocked.
Temporary Workarounds and Mitigation Steps
Until a permanent fix is released, Microsoft and Bleeping Computer suggest the following temporary workarounds:
-
Manually run affected apps as Administrator: Right-click the application executable (or its shortcut) and select “Run as administrator” from the context menu. This action grants the app the elevated permissions required for installer actions.
-
IT admin action: Enable Known Issue Rollback (KIR): Organizations can temporarily roll back the problematic behavior by applying a special Group Policy using Microsoft’s Known Issue Rollback mechanism, available for Windows 11 (22H2, 23H2, 24H2), Windows 10 (21H2, 22H2), and Windows Server (2022, 2025). Microsoft advises contacting their business support team for guidance and policy files.
Upcoming Fixes and Related Issues
Microsoft is already developing an update to allow IT administrators to designate specific trusted apps that can perform MSI repair operations without the elevated UAC prompt. This update will help restore previous deployment workflows and ensure that mission-critical software updates or repairs can proceed without constant administrator approval.
Other Reported Bugs
In addition, Microsoft is addressing a separate issue caused by the August 2025 security updates, resulting in severe lag and stutter for users running NDI streaming software on Windows 10 and Windows 11. However, Microsoft clarified that these updates have no link to recent SSD or HDD failure and data corruption reports associated with the August security update KB5063878.
Windows 11 24H2: Context for Security and Performance Enhancements
Amid these short-term troubles, the Windows 11, version 24H2 update otherwise brings noteworthy improvements:
-
Enhanced security architecture
-
Faster update servicing
-
Performance optimizations
-
Fixes for sign-in delays on new devices
These changes reflect a broad push toward making Windows deployments more stable and resilient, even as they occasionally introduce transitional friction for end users and administrators.
Security always comes with tradeoffs, and the Microsoft August 2025 security updates are a clear example. While effectively closing a dangerous privilege escalation vulnerability, the new requirements have temporarily complicated the daily workflows of millions, especially those without administrative privileges. IT teams should watch for Microsoft’s forthcoming fix and temporarily adopt the suggested workarounds to ensure continued productivity. For any impact related to software deployment, automated installations, or UAC prompts, verify your environment against the affected versions and consider consultation with Microsoft support.
Windows users, IT departments, and enterprise software managers should remain vigilant for further announcements as Microsoft pushes out its next round of crucial updates to resolve this issue.
Discover more from Microsoft News Now
Subscribe to get the latest posts sent to your email.