HomeIntelligenceBrief
BREACH BRIEF🟠 High Advisory

Windows Update Bug Blocks Security Patches on Windows 11 Devices with Low EFI Partition Space

A Microsoft Windows 11 update (KB5089549) fails with error 0x800f0922 on systems with insufficient EFI partition space, preventing critical security fixes from being applied. Organizations must remediate ESP size to restore patch flow and reduce third‑party risk.

LiveThreat™ Intelligence · 📅 May 20, 2026· 📰 techrepublic.com
🟠
Severity
High
AD
Type
Advisory
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
techrepublic.com

Windows Update Bug Blocks Security Patches on Windows 11 Devices with Low EFI Partition Space

What Happened – Microsoft disclosed that the cumulative update KB5089549 can fail with error 0x800f0922 on Windows 11 machines that have insufficient EFI‑system‑partition (ESP) space. The failure prevents the installation of the update, which includes critical security fixes. Microsoft published work‑arounds and guidance for reclaiming ESP space.

Why It Matters for TPRM

  • Unpatched Windows 11 endpoints remain vulnerable to known exploits, raising third‑party risk for any organization that relies on Microsoft as a critical service provider.
  • The issue is systemic; any vendor that ships Windows 11 devices with a small ESP may inherit the same exposure, affecting supply‑chain security assessments.
  • Delayed remediation can cascade into compliance gaps (e.g., PCI‑DSS, HIPAA) for downstream customers.

Who Is Affected – Enterprises across all sectors that deploy Windows 11 desktops/laptops, especially OEM‑configured devices with limited EFI partition size; Managed Service Providers (MSPs) that manage Windows fleets.

Recommended Actions

  • Inventory ESP sizes on all Windows 11 assets; flag any partitions < 100 MB.
  • Apply Microsoft’s published ESP‑cleanup scripts or manually expand the partition before the next update cycle.
  • Verify that critical security updates (e.g., CVE‑2025‑XXXX patches) are successfully applied post‑remediation.
  • Update third‑party risk questionnaires to reflect the temporary inability to apply patches.

Technical Notes – The failure originates from the Windows Update engine’s inability to write the update payload to an EFI partition that lacks sufficient free space. No CVE is associated; the issue is a regression in the update package (KB5089549). Affected data types are limited to system binaries; no data exfiltration reported. Source: TechRepublic Security

📰 Original Source
https://www.techrepublic.com/article/news-windows-update-rollout-bug/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.