Forum Discussion

EMR88's avatar
EMR88
Copper Contributor
Apr 14, 2026
Solved

2026-04 Update Breaks Domain Logins

I have an Active Directory domain that is old (from 2000!) that has been upgraded and moved to newer versions of Windows Server and Active Directory.   I have domain controller VMs running Windows Server 2025 Standard Edition.  Unfortunately they installed the latest 2026-04 patches which my have changed the Kerberos encryption from RC4 to AES.  This has resulted in my not being able to log into any Active Directory domain accounts and the domain controllers themselves.  I can only log into workstations using the local account.

Suffice to say this a nightmare.  Any ideas how to fix it since I can't access the usual tools like Active Directory Users and Computers, Hyper-V won't connect to the VMs, etc.  Thanks.

 

 

 

 

S

  • You will not have a change to access the domain controller, because there are no local users available.

    The only possible solution I have found is:

    • Restore domain controller from backup before install the update.
    • Then reset the password of the administrator. This will force to generate an AES key.
    • Install the update again.

    Please have also a look on:

    • https://learn.microsoft.com/en-us/windows-server/security/kerberos/detect-remediate-rc4-kerberos

    • https://support.microsoft.com/en-us/topic/how-to-manage-kerberos-kdc-usage-of-rc4-for-service-account-ticket-issuance-changes-related-to-cve-2026-20833-1ebcda33-720a-4da8-93c1-b0496e1910dc

    In my environment it has worked. Hope it works for you.

    Good luck

8 Replies

  • EMR88's avatar
    EMR88
    Copper Contributor

    Thomas--

    Thanks, great minds think alike!  Since my 2 DCs are also VMs, I shut them both down and restored a DC from backup that was dated before the 2026-04 patch.  Once the restored DC was up and running, I enabled the AES encryption attributes on the userids (my AD dates from 2000 so the schema supported AES encryption but it was not enabled on any user accounts leading to my login issues).  I also updated the ticketing service password twice (waiting over 10 hours in between) and modified the GPOs to force AES encryption.

    Once I was able to access all my domain resources again, I realized I was going to experience USN issues since the 2 VM backups were over 6 hours apart by time stamp.  (I have since addressed this issue by adjusting backup schedules so the 2 DCs will be backed up at the same time.)   I restored the second DC VM, started it, logged in and immediately demoted it from being a DC.

    Again I verified that everything inside the domain could be accessed.  I removed DNS from the second DC, waited a few hours, and added back in DNS and AD DS.  All seems to be good now!  I just hope I am already prepared for the next Microsoft enforcement change coming in June 2026.

     

     

  • You will not have a change to access the domain controller, because there are no local users available.

    The only possible solution I have found is:

    • Restore domain controller from backup before install the update.
    • Then reset the password of the administrator. This will force to generate an AES key.
    • Install the update again.

    Please have also a look on:

    • https://learn.microsoft.com/en-us/windows-server/security/kerberos/detect-remediate-rc4-kerberos

    • https://support.microsoft.com/en-us/topic/how-to-manage-kerberos-kdc-usage-of-rc4-for-service-account-ticket-issuance-changes-related-to-cve-2026-20833-1ebcda33-720a-4da8-93c1-b0496e1910dc

    In my environment it has worked. Hope it works for you.

    Good luck

  • rtcpu's avatar
    rtcpu
    Copper Contributor

    For now, you can revert this behaviour from "enforcement mode" to "audit mode" by applying a registry setting to your domain controllers and restarting them. After installing the July 2026 updates you won't be able to roll back.

    Here are some articles to read to understand the changes and what you can do about it.

    What Changed in RC4 with the January 2026 Windows Update and Why it is Important | Microsoft Community Hub

    What is going on with RC4 in Kerberos? | Microsoft Community Hub

    https://support.microsoft.com/en-us/topic/how-to-manage-kerberos-kdc-usage-of-rc4-for-service-account-ticket-issuance-changes-related-to-cve-2026-20833-1ebcda33-720a-4da8-93c1-b0496e1910dc

  • CHHuber's avatar
    CHHuber
    Copper Contributor

    Same here, 2 Domain Controllers with Server 2025 say wrong Password since Update 2026-04
    Any idea how to fix this?

    • CHHuber's avatar
      CHHuber
      Copper Contributor

      I had one more Domain Controller on Server 2019. There I was able to login and to change the Domain Admin Password. Problem solved.

      Maybe it would also bei possible to add a new Domain Controller with a older OS and to change the password there ...

    • Mister_K's avatar
      Mister_K
      Copper Contributor

      Same, you can roll out with a backup. Restore your domain controller with a previous backup with your DSRM password. And you'll be fine. 

    • Mister_K's avatar
      Mister_K
      Copper Contributor

      Same as above : Restore your domain controller (where the PDC role is) and you'll be sorted. 

      Do not forget to retrieve the DRSM password .

       

      Good luck .