Aug 11 2022 08:30 AM
Hello
We have encountered some issues with KB5016623. The is causing the server, Win 2019 server running IIS, to crash after 5 to 10 minutes and to be unable to use AAD App Proxy connections that are setup to use Windows Authentication on the backend via kerberos.
We have 2 different scenarios:
(0x80090301)
After about 5-10 minutes, the server seems to crash with this error:
A critical system process, C:\WINDOWS\system32\lsass.exe, failed with status code c0000005.The machine must now be restarted.
The process wininit.exe has initiated the restart of computer <ServerName> on behalf of user for the following reason: No title for this reason could be found
Reason Code: 0x50006
Shut-down Type: restart
Comment: The system process 'C:\WINDOWS\system32\lsass.exe' terminated unexpectedly with status code -1073741819. The system will now shut down and restart.
In both examples, uninstalling KB5016623 has resolved the issue. We don't seem to be seeing any issues with other servers e.g. DCs at present. It mainly seems to be the combination of KB5016623 and AAD App Proxy with Kerberos back ends. Anyone else seeing any similar problems?
Thanks
Andy
Aug 11 2022 05:26 PM
SolutionHi Andrew,
We had the same issue today. Uninstalling KB016623 resolved it as well. I've logged it with Microsoft. Will report back when they respond.
Glen.
Aug 15 2022 02:08 PM
Aug 16 2022 01:33 AM
Hi!
We had exactly the same issue , but with 2016 servers and KB5016622.
Unistall this KB fixed the issue.
Aug 22 2022 12:01 AM
Aug 22 2022 06:55 AM
Aug 22 2022 07:26 AM - edited Aug 22 2022 07:27 AM
Anyone else using "RunAsPPL LSA Protections on the servers?
As part of debug with MS I had to remove the RunAaPPL reg key to be able to trace lsass.
To my surprise the AAD App Proxy started working after removing reg key and reboot server, with KB5016681 installed.
Ref: https://docs.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/confi...
Aug 22 2022 07:31 AM
Aug 24 2022 08:55 AM
Aug 24 2022 02:31 PM
I have removed the RunAaPPL key from some standby servers (we deploy the key as standard practice) and provisionally I think things are working. My production servers are still running without KB5016623 and I can’t risk the instability at the moment as I work in education and the next few days are the most important of the year.
However, to test, I have routed a few non essential web sites through backup servers running AAD proxy and the latest server patch (Aug 23rd - KB5016690) with RunAaPPL key removed and both Windows Auth and Modern Auth websites are working as expected. So, I feel confident that this might be the answer.
I found that servers crashed more quickly when the server was under load, so will need to see what the nest few days brings. If my fully patched servers last until Monday without crashing & rebooting, I’ll update the production servers again.
Fingers crossed
Aug 25 2022 12:41 AM
Oct 03 2022 08:44 AM
Oct 08 2022 10:40 PM
Oct 31 2022 09:55 AM
@freddy104 MS has advised not to patch the server until fix is released. They proposed a registry change, however it did not work.
Nov 10 2022 03:23 PM
Word from Microsoft is that this issue is fixed in the November 8 Patch Tuesday patches. Can anyone confirm if they have tested the 11/8 patches to confirm the issue is resolved?
Nov 10 2022 03:23 PM
Word from Microsoft is that this issue is fixed in the November 8 Patch Tuesday patches. Can anyone confirm if they have tested the 11/8 patches to confirm the issue is resolved?
Nov 10 2022 04:27 PM
Nov 11 2022 03:10 AM - edited Nov 11 2022 05:02 AM
Similar patch for Server 2019 is KB5019966:
November 8, 2022—KB5019966 (OS Build 17763.3650) - Microsoft Support