The recent Windows 11 August 2025 security update has introduced unexpected challenges for non-administrative users, as it causes unintended User Account Control (UAC) prompts and application crashes. In Microsoft's attempt to fix the privilege-escalation vulnerability identified as CVE-2025-50173, enhancements to UAC inadvertently resulted in standard users encountering admin-rights prompts.
Understanding the Impact
The circumstances triggering these new UAC prompts include running MSI repair commands, launching programs such as Autodesk, installing applications configured per user, and deploying packages with user-specific advertising configurations via Configuration Manager (ConfigMgr). Additionally, engaging secure desktop features also contributes to the issue.
Specifically, users employing MSI repair operations that run without a user interface or executing commands like msiexec /fu may experience difficulties. Moreover, those attempting to run Office Professional Plus 2010 might encounter error code 1730, signifying a failure due to insufficient permissions for standard users.
Widespread Affected Systems
This bug is not isolated to Windows 11 alone but spans many iterations of Windows 10, Windows 11, and Windows Server versions dating back to Server 2012. Thus, the software landscape for organizations using these platforms faces potential disruptions, especially where standard user accounts are prominent.
- Running MSI repair commands without user interfaces can lead to errors.
- Installation of certain applications may trigger unintended prompts.
- Office Professional Plus 2010 may fail with error code 1730.
Mitigation Strategies
In response to these developments, Microsoft has proposed several workarounds to alleviate the disruptions caused by the update. One temporary solution is for affected users to employ the "Run as administrator" option when launching applications. This grants the necessary admin privileges, circumventing the unauthorized prompts faced by standard users.
For larger IT environments, implementing the Known Issue Rollback (KIR) group policy offers a more efficient remedy. This policy enables administrators to roll back the security update's adverse effects by removing the glitchy UAC prompts, thus stabilizing user experiences until a complete fix is established.
The resolution of this issue remains a priority for Microsoft, as they continue to work towards providing a comprehensive solution to address the unintended consequences of the August 2025 security update, ensuring smoother operation across all user levels.