Anavem
Languagefr
Empty office workstations displaying authentication error messages on computer monitors

KB5074109 Update Breaks Azure Virtual Desktop Connections

Microsoft's January 2026 cumulative update KB5074109 is preventing enterprise users from connecting to Azure Virtual Desktop and Windows 365 Cloud PCs.

11 February 2026, 22:06 5 min read

Last updated 9 April 2026, 00:12

EXPLOITUnknown
PATCH STATUSUnavailable
VENDORMicrosoft
AFFECTEDWindows 11 builds 26100.7623 a...
CATEGORYMicrosoft 365

Key Takeaways

KB5074109 Update Triggers Widespread AVD Connection Failures

Microsoft released the January 13, 2026 cumulative update KB5074109 for Windows 11 as part of its monthly Patch Tuesday cycle, but the update quickly triggered widespread authentication failures for enterprise users attempting to connect to Azure Virtual Desktop sessions and Windows 365 Cloud PCs. The update, which corresponds to OS builds 26100.7623 and 26200.7623, was intended to deliver quality improvements and security fixes including power management enhancements for Neural Processing Units (NPUs) and Secure Boot certificate management changes.

Within hours of the update's release, enterprise administrators across multiple organizations began reporting immediate authentication errors when users attempted to launch AVD or Cloud PC sessions through the Windows 365 and Windows App clients. The most commonly reported error was "An authentication error has occurred (Code: 0x80080005)," which appeared immediately upon connection attempts, preventing any session establishment. Unlike typical backend service outages, these failures occurred before users could reach the remote desktop environment, indicating a client-side regression in the authentication handshake process.

Microsoft quickly acknowledged the regression in the KB5074109 support article, adding the issue to the Known Issues section and providing immediate guidance for affected organizations. The company confirmed that the problem stems from changes to Remote Desktop credential prompt handling and is concentrated in enterprise-managed environments where specific authentication configurations are in use. Consumer Home and Pro editions are reportedly unaffected by this particular regression.

Community reproductions and independent testing confirmed that uninstalling KB5074109 or applying Microsoft's Known Issue Rollback (KIR) immediately restored connectivity for affected endpoints. This rapid community validation helped Microsoft isolate the root cause to client-side authentication components rather than broader Azure infrastructure issues. The vendor has indicated that an out-of-band fix is being prepared to address the regression while maintaining the security and quality improvements included in the original update.

Enterprise Windows Environments Face Immediate Impact

The KB5074109 regression specifically affects enterprise-managed Windows 11 and Windows 10 environments that rely on Azure Virtual Desktop and Windows 365 Cloud PC services for remote work capabilities. Organizations using domain-joined devices with enterprise authentication configurations, particularly those leveraging Microsoft Entra ID (formerly Azure AD) single sign-on and conditional access policies, are experiencing the most severe impact. The issue appears to be triggered by specific combinations of client-side authentication agents, enterprise SSO configurations, and the updated Remote Desktop connection components.

Microsoft has confirmed that consumer editions of Windows, including Home and Pro SKUs, are very unlikely to encounter this authentication failure. The regression is concentrated in environments where Group Policy settings, enterprise certificate stores, and managed authentication flows are configured. Organizations using hybrid identity configurations, where on-premises Active Directory is synchronized with cloud identity providers, may experience varying degrees of impact depending on their specific authentication topology and client configuration management practices.

The immediate business impact for affected organizations is significant, as remote workers and hybrid employees lose access to their primary work environments hosted in Azure Virtual Desktop or Windows 365. IT administrators report that the authentication failures prevent users from accessing critical business applications, files, and development environments hosted on cloud-based virtual machines. Organizations with large remote workforces or those that have migrated entirely to cloud-based desktop infrastructure face operational disruption until the issue is resolved through KIR deployment or the pending out-of-band update.

Immediate Mitigation Steps and Workaround Options

Microsoft has provided multiple remediation paths for organizations experiencing AVD and Cloud PC connection failures after installing KB5074109. The primary recommended solution is deploying Known Issue Rollback (KIR) through existing enterprise update management infrastructure. IT administrators can implement KIR using Windows Update for Business, Windows Server Update Services (WSUS), or Microsoft Configuration Manager to automatically revert the problematic components while preserving other security fixes from the update. The KIR deployment typically takes effect within 24 hours and doesn't require a full system restart in most configurations.

For immediate relief while KIR deployment is in progress, Microsoft recommends using alternative connection methods that bypass the affected client authentication components. Users can access their AVD sessions through the web-based Remote Desktop client available at rdweb.wvd.microsoft.com, which uses browser-based authentication flows that aren't impacted by the KB5074109 regression. Additionally, the classic Remote Desktop Connection client (mstsc.exe) can be used to connect directly to published RemoteApp applications, though this requires manual configuration of connection parameters that are typically handled automatically by the Windows App client.

Organizations requiring immediate restoration of full functionality can temporarily uninstall KB5074109 using the "View update history" option in Windows Update settings or through PowerShell commands for bulk deployment. However, Microsoft strongly advises against permanent removal of the update due to the security fixes it contains. Instead, affected organizations should implement the temporary workarounds while preparing for the out-of-band fix that Microsoft is developing. The company has indicated that the remediation update will specifically address the Remote Desktop authentication regression while maintaining all security improvements from the original KB5074109 package.

Frequently Asked Questions

How do I fix KB5074109 Azure Virtual Desktop connection issues?+
Deploy Microsoft's Known Issue Rollback (KIR) through your enterprise update management system, or temporarily use the web-based Remote Desktop client at rdweb.wvd.microsoft.com. Microsoft is preparing an out-of-band fix to permanently resolve the authentication regression.
Which Windows versions are affected by the KB5074109 AVD bug?+
The issue affects Windows 11 builds 26100.7623 and 26200.7623, plus Windows 10 systems with KB5074109 installed. Enterprise-managed environments with domain-joined devices experience the most severe impact, while consumer Home and Pro editions are unlikely to be affected.
Can I safely uninstall KB5074109 to restore AVD connectivity?+
While uninstalling KB5074109 will restore connectivity, Microsoft recommends using Known Issue Rollback or temporary workarounds instead. The update contains important security fixes that should be preserved until the out-of-band remediation is available.

Discussion

Share your thoughts and insights

Sign in to join the discussion