Microsoft has released a late-November fix that many enterprise administrators won’t want to ignore. The new KB5072753 hotpatch targets Windows 11 Enterprise and Windows Server 2025 systems using the 26200.x build branch, resolving a problematic reoffer bug while delivering additional security hardening.

Unlike routine Patch Tuesday updates, this release is out-of-band (OOB) and applies without requiring a reboot on hotpatch-enrolled devices. It also arrives bundled with the existing servicing stack update (SSU) KB5067035, streamlining deployment and avoiding dependency issues.

What Is KB5072753?

KB5072753 is a special hotpatch issued on November 20, 2025, designed specifically for:

  • Windows 11 Enterprise 25H2 and 24H2 (hotpatch-enrolled)
  • Windows Server 2025 Datacenter Azure Edition and other compatible SKUs aligned to the 26200.x client build family

Key Technical Details

PropertyDetails
KB IDKB5072753
Post-Install Build26200.7093
TypeOut-of-band hotpatch (no reboot required)
Release DateNovember 20, 2025
Bundled SSUKB5067035, version 26100.7010
Delivery ChannelsWindows Update, Intune/managed services, Microsoft Update Catalog
Vendor NotesNo known issues at release

This hotpatch follows KB5068966 (26200.7092) from November 11, acting as a corrective release rather than introducing new visible features.

Why KB5072753 Was Released

After deployment of the November 11 hotpatch (KB5068966), some Windows 11 Enterprise 25H2 systems began seeing the same update offered repeatedly via Windows Update, even though it had already been installed.

READ 👉  How to Fix 'An Unexpected Error Is Preventing You from Renaming the Folder' in Windows 11

Symptoms of the Reoffer Bug

  • KB5068966 showed as successfully installed
  • Windows Update continued reinstalling it
  • Only the timestamp changed—no system behavior changed

KB5072753 fixes this reoffer loop, ensuring Windows Update does not repeatedly reinstall last month’s hotpatch.

Although the update doesn’t advertise user-visible improvements, it also includes additional security and reliability hardening, building on the October baseline.

Where KB5072753 Fits in the Hotpatch Lifecycle

Hotpatching follows a predictable cycle: a quarterly baseline that requires a reboot, followed by monthly hotpatches that install silently without restarts.

Timeline for Late 2025

DateUpdate
October 14, 2025Mandatory baseline for Windows 11 & Server 2025
November 11, 2025Monthly hotpatch KB5068966
November 20, 2025OOB hotpatch KB5072753 (reoffer fix)

The servicing stack remains unchanged at KB5067035, already widely deployed.

Requirements for Hotpatch on Windows 11 Clients

Hotpatching is an enterprise-only capability, not meant for consumer editions. Before KB5072753 can deploy to client devices, the following must be in place:

RequirementMinimum Condition
Windows EditionWindows 11 Enterprise 25H2 / 24H2
Minimum Build26100.4929
LicensingEnterprise E3/E5, Education A3/A5, Business Premium, F3, Windows 365 Enterprise
ManagementIntune policy with hotpatch enabled
SecurityVirtualization-based security (VBS) on
ARM64 OnlyCHPE (Compiled Hybrid PE) disabled

Disabling CHPE on ARM64 Devices

Hotpatching can’t function with CHPE enabled. IT teams can disable it by:

  1. Using the DisableCHPE setting in Intune or another MDM and then rebooting, or
  2. Setting the registry key: HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\HotPatchRestrictions = 1

Once CHPE is disabled and devices meet the baseline, they can be enrolled into a hotpatch policy configured to apply updates without rebooting.

READ 👉  How to Fix Windows 11 Error 0x0000009F: Step-by-Step Guide

How KB5072753 Is Distributed

The hotpatch uses a combined SSU + hotpatch package, ensuring the correct servicing stack is applied automatically.

Delivery Options

ChannelAvailability
Windows UpdateAuto-delivery for enrolled devices
Intune/ConfigMgr/AutopatchManaged approval and scheduling
Microsoft Update CatalogManual download for offline environments
WSUSAvailable for supported Server 2025 hotpatch SKUs

For manual deployment, Microsoft recommends placing all KB5072753 MSUs in one folder and letting DISM handle dependencies:

DISM /Online /Add-Package /PackagePath:C:\Packages\Windows11.0-KB5072753-x64.msu

The same applies for offline imaging using /Image or -Path.

Enterprise Deployment Checklist

Most organizations will deploy KB5072753 urgently, but with staged validation. A recommended workflow:

StepTaskPurpose
1Inventory hotpatch-enrolled devicesDefine patch scope
2Verify SSU KB5067035Prevent servicing issues
3Review WSUS metadata and approvalsAvoid mis-targeting
4Pilot deploymentDetect anomalies early
5Roll out broadlyStabilize build consistency
6Confirm OS buildEnsure device remains on hotpatch track

Why Caution Matters

An earlier WSUS incident (CVE-2025-59287) caused Server 2025 systems to unintentionally leave the hotpatch track due to mis-targeted packages. Because of this history, KB5072753 should be approved with heightened scrutiny, even though it does not alter WSUS behavior directly.

Risks and Trade-Offs With Out-of-Band Hotpatching

Hotpatches save organizations time and reduce disruptive reboots, especially for:

  • High-availability server clusters
  • RDS/VDI environments
  • Critical on-prem workloads

However, they introduce some challenges:

  • Tight dependency on baselines
  • Higher servicing complexity across channels
  • Limited vendor transparency about impact scopes

KB5072753 is relatively clean in this regard—its primary function is to fix the update reoffer problem and reinforce security without changing servicing stacks or introducing a new baseline.

READ 👉  How to Fix Windows Update Issues: Solutions for Download and Installation Problems

Final Thoughts

For organizations committed to Microsoft’s hotpatch model, KB5072753 is essential. It not only eliminates the November reoffer annoyance but also ensures a consistent 26200.7093 build across fleets, paving the way for a smooth transition to the next quarterly baseline.

By deploying this OOB hotpatch through controlled rings, enterprises can maintain uptime, reduce patch uncertainty, and keep update histories clean heading into 2026.

Did you enjoy this article? Feel free to share it on social media and subscribe to our newsletter so you never miss a post!

And if you'd like to go a step further in supporting us, you can treat us to a virtual coffee ☕️. Thank you for your support ❤️!
Buy Me a Coffee

Categorized in: