Microsoft to automatically roll back faulty Windows drivers

BleepingComputer T2 clear 15 May 2026 796 words ORIGINAL
Classification
SEV 3/10
Microsoft to automatically roll back faulty Windows drivers Home News Microsoft Microsoft to automatically roll back faulty Windows drivers Sergiu Gatlan May 15, 2026 08:29 AM Microsoft is introducing a new capability that will allow it to remotely roll back problematic Windows drivers delivered through Windows Update. Called Cloud-Initiated Driver Recovery, the new feature will remove the need for hardware partners or end users to manually fix driver issues once drivers have been distributed to devices. The recovery process is entirely managed by Microsoft, with no partner-side actions required, and will only be initiated for Windows drivers rejected due to quality issues during shiproom evaluation.
CONFIDENCE45%
Categories
vulnerabilitycloud_securityiot_ot_security
Threat Actors
Target Sectors

Microsoft to automatically roll back faulty Windows drivers Home News Microsoft Microsoft to automatically roll back faulty Windows drivers Sergiu Gatlan May 15, 2026 08:29 AM Microsoft is introducing a new capability that will allow it to remotely roll back problematic Windows drivers delivered through Windows Update. Called Cloud-Initiated Driver Recovery, the new feature will remove the need for hardware partners or end users to manually fix driver issues once drivers have been distributed to devices.

The recovery process is entirely managed by Microsoft, with no partner-side actions required, and will only be initiated for Windows drivers rejected due to quality issues during shiproom evaluation. Under the current system, if a driver distributed through Windows Update has quality issues, the hardware partner must submit a replacement, or users must manually uninstall the faulty driver, which can leave devices using subpar drivers for a long time.

With Cloud-Initiated Driver Recovery, Microsoft can directly trigger a rollback to a previous, stable driver version (or the next best version available on Windows Update) without requiring new software or actions from hardware partners. "Today, when a driver published through Windows Update is identified after distribution to have quality issues, the remediation path relies on the hardware partner to submit an updated driver — or on end users to manually uninstall the problematic driver themselves.

This creates a gap where devices may remain on a low-quality driver for an extended period," Microsoft said . "With Cloud-Initiated Driver Recovery, Microsoft can now trigger a recovery action directly from the Hardware Dev Center (HDC) Driver Shiproom, rolling back a problematic driver to the previously known-good version via the Windows Update pipeline. This is handled through coordinated updates to the PnP driver stack and the driver flighting and publishing services." The company also noted that: Devices where a Driver Shiproom-approved driver cannot be located will not attempt Cloud-Initiated Driver Recovery Recovery is delivered through the existing Windows Update infrastructure — no new client agent or partner tooling is required.

The new Windows Update feature is being tested between May and August and will begin rolling back drivers rejected during Flighting or Gradual Rollout starting September 2026. Last week, at WinHEC 2026 (the Windows Hardware Engineering Conference) in Taipei, Microsoft unveiled a Driver Quality Initiative (DQI) to raise driver quality, reliability, and security across the Windows ecosystem, in coordination with OEM, silicon, and hardware partners. "In the months ahead, we will keep investing in the fundamentals that matter most to customers: reliability, security, performance, compatibility and quality," Microsoft said. "We'll also keep collaborating with OEMs, silicon partners, IHVs, ODMs and the broader hardware ecosystem through the Windows Resiliency Initiative, the new Driver Quality Initiative and the work we do together every day." In June 2025, Microsoft also announced plans to periodically remove legacy drivers from the Windows Update catalog to mitigate compatibility issues and security risks.

The Validation Gap: Automated Pentesting Answers One Question. You Need Six. Automated pentesting tools deliver real value, but they were built to answer one question: can an attacker move through the network? They were not built to test whether your controls block threats, your detection rules fire, or your cloud configs hold. This guide covers the 6 surfaces you actually need to validate. Download Now Microsoft fixes Windows Autopatch bug installing restricted drivers Microsoft May 2026 Patch Tuesday fixes 120 flaws, no zero-days Windows 11 KB5089549 & KB5087420 cumulative updates released Microsoft releases emergency updates to fix Windows Server issues Microsoft rolls out revamped Windows Insider Program Driver Microsoft Windows Windows Update Sergiu is a news reporter who has covered the latest cybersecurity and technology developments for over a decade.

Email or Twitter DMs for tips. IhateMicroSoft 19 hours ago Tell me what could go wrong, without telling me what could go wrong. Post a Comment Community Rules You need to login in order to post a comment Not a member yet? Register Now You may also like: Upcoming Webinar Popular Stories Windows BitLocker zero-day gives access to protected drives, PoC released Dell confirms its SupportAssist software causes Windows BSOD crashes OpenAI confirms security breach in TanStack supply chain attack Sponsor Posts Are stolen sessions bypassing your security?

Find out for free. https://www.nmftacyber.com/ 12 steps to defend against AI-powered exploits before the Glasswing report drops Overdue a password health-check? Audit your Active Directory for free Login Username Password Remember Me Sign in anonymously Sign in with Twitter Reporter Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... SUBMIT

Extracted Entities (0)
No threat entities extracted.
ID: 345Lang: enType: article