Microsoft confirms a widespread synchronization failure in WSUS caused by defective metadata in recent updates. System administrators worldwide report outages, timeouts, and thousands of outdated patches being redownloaded after services recover.

On July 9, 2025, Windows Server Update Services (WSUS) administrators across the globe experienced one of the most disruptive sync failures in recent memory. A batch of Microsoft updates released with corrupted metadata triggered full-sync requests from servers worldwide, overwhelming Microsoft’s infrastructure and causing widespread synchronization failures.

The root cause: faulty updates in the “Updates” classification

Initially reported by sysadmins on Reddit’s r/sysadmin, the issue was quickly recognized as a global-scale incident. Microsoft later confirmed via internal support messages that the problem was tied to updates categorized under “Updates” (not Security or Critical), published with broken metadata.

“The issue was due to updates published with defective metadata that triggered full synchronizations globally. This put significant pressure on Microsoft Update infrastructure, resulting in widespread timeouts,” Microsoft support clarified.

Widespread failure and impact

Admins reported a variety of symptoms:

  • InvalidOperationException: There is an error in XML document
  • A connection attempt failed... the connected host has failed to respond
  • WSUS servers attempting to download 180+ GB of update data
  • Over 5,000 outdated updates appearing as “new” and unapproved

Some temporary workarounds included unchecking the “Updates” category or replacing IIS SSL certificates with 2,048-bit versions (instead of 4,096-bit), although Microsoft discouraged using these insecure methods as a long-term fix.

“We managed to restore syncing by downgrading our SSL certificate key length,” one Reddit user shared. “Not recommended, but it worked temporarily.”

Resolution: Expiring the defective content

Microsoft took over 24 hours to identify and expire the problematic update revisions. Once the metadata issues were resolved and global sync traffic subsided, WSUS servers began syncing successfully again—though many admins were left cleaning up the aftermath of unexpected update floods.

The incident is documented at the Windows Release Health Center, although some IT pros reported difficulties accessing it via standard Microsoft 365 accounts.

Community response: Is this the push to abandon WSUS?

As usual, the sysadmin community responded with both sarcasm and frustration. Some suggested the incident may indirectly push organizations toward Microsoft’s cloud-based alternatives, such as Intune or Azure Patch Management.

“Microsoft, probably: ‘We’ve deprecated WSUS. Please enjoy our new Azure Patch Management service—now with 80% more AI and 0% reliability,’” joked one Redditor.

Others defended WSUS as a lightweight and effective solution—when properly maintained—but acknowledged its need for regular manual care: declining superseded updates, cleaning obsolete clients, and reindexing the WSUS database.


Recommendations for sysadmins

Until full stability is confirmed, experts suggest:

  • Verify last successful syncs and manually trigger if needed
  • Run WSUS cleanup wizard to remove obsolete updates and content
  • Decline superseded updates to reduce clutter and sync size
  • Watch for duplicate or legacy updates showing as new
  • Monitor Microsoft admin channels for further developments

WSUS remains a critical patch management tool for many enterprises, but this event highlights the fragility of on-premise update distribution and the need for transparent, timely communication from Microsoft.

Scroll to Top