Table of Contents
- How Did Microsoft's April Update Destroy Enterprise USB Protection Across Windows 10 and 11?
- What Happened to USB Device Control
- How USB Blocking Usually Works
- The Real-World Impact
- Microsoft's Official Response
- Root Cause Identified
- Timeline of Events
- Temporary Solutions That Might Help
- Recreate Your Group Policies
- Verify Your Device GUIDs
- Use Alternative Blocking Methods
- Submit Feedback to Microsoft
- What This Means for Your Organization
- Immediate Risks
- Long-term Concerns
- My Recommendation
- The Bigger Picture
How Did Microsoft's April Update Destroy Enterprise USB Protection Across Windows 10 and 11?
I need to tell you about a serious problem that's hitting IT departments hard right now. Your USB security controls might not be working, and you probably don't even know it yet.
What Happened to USB Device Control
Let me start with the basics. Many companies use Group Policy Objects (GPOs) to block USB devices. This keeps bad guys from plugging in infected USB drives or stealing data. It's been a reliable security tool for years.
But something went wrong in April 2025. Microsoft pushed out updates that broke this protection completely.
Here's what I know from talking to IT administrators who discovered this problem:
The Problem Started in April 2025
- Windows 10 22H2 systems affected
- Windows 11 23H2 systems affected
- USB blocking policies stopped working entirely
- Both HKCU and HKLM registry settings failed
How USB Blocking Usually Works
Before I explain what broke, let me show you how this security feature normally operates.
IT teams create three registry entries to control USB access:
HKCU\SOFTWARE\Policies\Microsoft\Windows\RemovableStorageDevices\{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
The three control settings are:
- Deny_Execute (REG_DWORD = 1) - Stops programs from running
- Deny_Read (REG_DWORD = 1) - Blocks reading files
- Deny_Write (REG_DWORD = 1) - Prevents writing data
This gives IT teams flexible control. They can block just writing while allowing reading, or block everything completely.
The Real-World Impact
A German IT administrator named Marcel reached out about this issue. His organization is classified as critical infrastructure (KRITIS), so USB security isn't optional - it's required by law.
Marcel's team noticed their USB controls stopped working after the April updates. Users could suddenly access USB drives that should have been blocked. This created a massive security gap.
What Marcel's Team Tried:
- Checked all registry settings - they looked correct
- Reapplied Group Policies - no change
- Tested on multiple systems - same failure everywhere
- Uninstalled the April update - USB blocking worked again
The only workaround was removing security updates, which obviously isn't acceptable.
Microsoft's Official Response
Marcel's team opened a support case with Microsoft. Here's what Microsoft confirmed:
Root Cause Identified
Microsoft changed their driver signing infrastructure in April 2025. Old certificate authorities expired, so they had to switch to new ones. This change affected how Windows validates drivers and enforces Group Policies at the driver level.
Timeline of Events
- April 2025: Infrastructure change breaks USB policies
- June 3, 2025: Microsoft confirms it's a known bug
- June 9, 2025: New certificate authority introduced
- June 10, 2025: Servicing update released (but didn't fix the main issue)
Microsoft admits this problem exists and promises a fix in a future update. But they haven't given a specific date.
Temporary Solutions That Might Help
While waiting for Microsoft's fix, here are some options to consider:
Recreate Your Group Policies
Sometimes building the policy from scratch helps. It's not guaranteed, but some administrators report success with this approach.
Verify Your Device GUIDs
Check if the GUID {53f5630d-b6bf-11d0-94f2-00a0c91efb8b} still works correctly. The update might have changed how Windows classifies USB devices.
Use Alternative Blocking Methods
Consider "blocking the upper device class" as a temporary measure. This affects more devices but might provide the security you need.
Submit Feedback to Microsoft
Use the Feedback Hub to report this issue. More reports help Microsoft prioritize the fix.
What This Means for Your Organization
This isn't just a technical glitch. It's a security vulnerability that affects thousands of organizations worldwide.
Immediate Risks
- Malware can enter through USB devices
- Sensitive data can be copied to external drives
- Compliance violations in regulated industries
- Audit failures for security controls
Long-term Concerns
- Trust in Microsoft's update process
- Need for alternative USB security solutions
- Potential legal liability from data breaches
My Recommendation
Don't wait for Microsoft to fix this. Test your USB blocking policies right now. Plug in a USB drive on a computer that should block it. If it works, you have this problem.
Consider these immediate steps:
- Test all systems - Check if your USB policies actually work
- Document the issue - Keep records for compliance audits
- Explore alternatives - Look into third-party USB security tools
- Monitor for updates - Watch for Microsoft's fix announcement
- Train users - Remind staff about USB security risks
The Bigger Picture
This incident shows how a single update can break critical security features. It highlights the need for better testing of Windows updates before they reach production systems.
For IT administrators, this is a wake-up call. Relying solely on built-in Windows security features might not be enough. Having backup security measures becomes more important than ever.
Microsoft will eventually fix this bug. But the damage to trust and security has already happened. Organizations need to be prepared for similar issues in the future.
The good news? The IT community is working together to identify and solve these problems. Marcel's willingness to share this discovery helps protect everyone else's systems.
Stay vigilant. Test your security controls regularly. And remember - sometimes the biggest threats come from the updates meant to protect us.