Security

Patches

Patch Tuesday updates spark errors when creating Hyper-V VMs

Something's broken, mom! Microsoft offers workaround while trying to think up a fix


Updates to Windows Server that were included in Microsoft's Patch Tuesday batch of fixes this week could trip up users who want to spin up new virtual machines in some Hyper-V hosts.

The software giant is warning the problem can arise after installing the KB5021249 or KB5021237 updates on Windows Server or Azure Stack HCI hosts that are managed by System Center Virtual Machine Manager (SCVMM) and are in software-defined networking (SDN)-enabled environments with a network controller.

The issue affects Windows Server 2019 and Windows Server 2022.

Windows administrators trying to create "a new Network Adapter (also called a Network Interface Card or NIC) joined to a VM network or a new Virtual Machine (VM) with a Network Adapter joined to a VM network" could see errors pop up, Microsoft engineers wrote in an update in the Windows Health Dashboard.

Windows admins may get messages warning about Ethernet connection errors when creating a new VM or network adapter on an existing VM, if an SDN software load balancer service fails, or if an SDN RAS Gateway service fails, according to Microsoft.

Existing VMs with existing network adapters won't have connection issues after installing the update, the company said. Only new network adapters created after installing KB502129 will be affected.

Microsoft engineers are working on a fix for the problem that will be included in an upcoming release. In the meantime, the company has developed a workaround.

Users can open an elevated PowerShell window on all SCVMM-managed Hyper-V hosts by hitting the Start button and typing "powershell," then right clicking or long pressing on it. They can then select "Run as Administrator" and run the following commands:

$lang = (Get-WinSystemLocale).Name

C:\Windows\system32\wbem\mofcomp.exe C:\Windows\system32\wbem\en-US\VfpExt.mfl

C:\Windows\system32\wbem\mofcomp.exe C:\Windows\system32\wbem\VfpExt.mof

In addition, they can find a script for the workaround for large-scale deployments and a post-install script to be integrated with patching tools. Both scripts are available here.

Users don't have to reboot a system after applying the workaround, according to Microsoft. ®

Speaking of Microsoft... The Windows giant said on Tuesday it has suspended several third-party developer accounts that submitted malicious operating system hardware drivers for Microsoft to cryptographically sign. It has also, we're told, taken steps to block the use of this code.

Those drivers, once approved by Microsoft, would be trusted by people's Windows PCs, and could be used by miscreants on compromised machines to help fully take over systems. Essentially, someone would find a way to get onto a victim's computer, gain admin access, and then load one of these drivers to achieve further control over the system.

As discovered, disclosed to Microsoft, and this week publicly detailed by SentinelOne, Mandiant, and Sophos, cybercrime crews successfully managed to get their malicious drivers certified by Microsoft via its Windows Hardware Developer Program.

This includes a so-called POORTRY kernel-mode driver that would be used to kill off security and antivirus tools on the compromised Windows PC. This code was, it's reported, used to help infect networks with ransomware. It's said that the Hive gang and others made use of the drivers.

It would be great if Microsoft didn't approve malicious drivers submitted to its developer programs. "Microsoft Partner Center is also working on long-term solutions to address these deceptive practices and prevent future customer impacts," the biz said.

Send us news
10 Comments

Google submits complaints about Microsoft licensing to UK competition regulator

Now Microsoft has regulator breathing down its neck in three regions

FTC wants Microsoft's relationship with OpenAI under the microscope

Hey Bing, how can I invest billions in a company but not break antitrust laws?

Microsoft partners with labor unions to shape and regulate AI

Redmond reassures AFL-CIO workers they won't be pushed out by technology

Experienced Copilot help is hard to find, warns Microsoft MVP

Almost nobody has used it, or knows it well, so beware of consultants bearing cred

Microsoft's relationship with OpenAI now in competition regulator's sights

Has recent CEO, board shenanigans given rise to a merger situation? CMA is asking for a friend

Attacks abuse Microsoft DHCP to spoof DNS records and steal secrets

Akamai says it reported the flaws to Microsoft. Redmond shrugged

Microsoft confirms Smart App issue renaming everyone's printers to HP

Not only turning up uninvited, but telling folks they suddenly have a LaserJet

Microsoft issues deadline for end of Windows 10 support – it's pay to play for security

Limited options will be available into 2028, for an undisclosed price

Creating a single AI-generated image needs as much power as charging your smartphone

PLUS: Microsoft to invest £2.5B in UK datacenters to power AI, and more

Microsoft to intro dedicated mode for Cloud PCs

Latest Insider Build brings new features for Windows 365 Boot

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good

Microsoft touts Visual Studio Code as a Java juggernaut

2.5 million devs can't be wrong – or can they?