Microsoft has announced a phased security plan to disable the hands-free deployment feature in Windows Deployment Services (WDS) after identifying a critical remote code execution vulnerability tracked as CVE-2026-0386. The flaw exposes enterprise environments to potential attacks during operating system deployment processes, prompting Microsoft to introduce security mitigations and ultimately retire the vulnerable functionality.
Windows Deployment Services is widely used by enterprise IT teams to deploy Windows operating systems across networks using PXE (Preboot Execution Environment). Through this capability, administrators can install operating systems remotely without physical access to machines. One of its most popular features hands-free deployment automates the installation process using an Unattend.xml configuration file. This file predefines installation settings, including system configuration details and administrative credentials, allowing organizations to deploy operating systems across large device fleets quickly and efficiently.
Cyber Technology Insights: Microsoft Uncovers Storm-2561 Credential Theft Scheme
However, security researchers recently discovered that the automation mechanism introduces a serious risk. The vulnerability exists because the Unattend.xml file can be transmitted over an unauthenticated Remote Procedure Call (RPC) channel. As a result, attackers positioned on the same network segment may intercept the file during the deployment process. Once intercepted, the attacker could extract sensitive credentials or inject malicious code into the deployment workflow.
If successfully exploited, the flaw could allow attackers to execute arbitrary code with SYSTEM-level privileges, one of the highest permission levels within Windows environments. Furthermore, this level of access could enable lateral movement across enterprise networks. In severe scenarios, attackers could manipulate operating system deployment images, effectively turning the vulnerability into a supply-chain-level threat within enterprise infrastructure.
Microsoft confirmed that the vulnerability affects multiple versions of Windows Server, including Server 2008, 2016, 2019, 2022, and the newer Server 2025 and version 23H2 releases. According to Microsoft’s security advisory, the vulnerability carries a CVSS v3.1 vector rating of AV:A/AC:H/PR:N/UI:N, indicating high impact across confidentiality, integrity, and availability despite requiring adjacency to the network.
To mitigate the risk while giving organizations time to adjust their deployment strategies, Microsoft has introduced a two-phase hardening plan. The first phase began on January 13, 2026, with a security update that allows administrators to manually disable the vulnerable feature. At this stage, the hands-free deployment capability remains operational but administrators can disable it through a new registry setting. Specifically, administrators can enforce secure behavior by setting AllowHandsFreeFunctionality = 0 within the WDS configuration registry path.
Additionally, the update introduces new event logging capabilities that warn administrators when insecure deployment configurations are detected. These alerts provide organizations with greater visibility into potential exposure while they transition away from the vulnerable configuration.
The second phase of Microsoft’s mitigation strategy will take effect in April 2026. During this stage, hands-free deployment will be fully disabled by default through a security update. Organizations that have not implemented the registry configuration changes before that time will automatically lose access to the feature after the update is installed.
Cyber Technology Insights: Upwind Partners with Microsoft to Deliver Unified Azure Cloud Security Solution
While administrators may temporarily re-enable the feature by setting AllowHandsFreeFunctionality = 1, Microsoft strongly warns that doing so should only be considered a short-term workaround. Maintaining the setting could leave enterprise environments exposed to potential exploitation.
To prepare for the change, Microsoft recommends that organizations immediately review all WDS configurations that rely on Unattend.xml automation files. Administrators should apply the January 2026 security update and enforce the secure registry setting before the April deadline. In addition, IT teams are encouraged to monitor Windows Event Viewer for alerts related to insecure deployment configurations.
Microsoft also advises enterprises to consider transitioning to alternative deployment solutions that are not affected by the vulnerability. Options such as Microsoft Intune, Windows Autopilot, and Microsoft Configuration Manager offer modern device provisioning frameworks that provide stronger authentication, improved automation controls, and enhanced security visibility.
Ultimately, Microsoft’s decision to retire hands-free deployment highlights the growing need to secure automated infrastructure processes. As enterprise environments become more automated and interconnected, vulnerabilities in deployment systems can quickly escalate into large-scale security risks. By phasing out insecure automation features and promoting modern device management platforms, Microsoft aims to help organizations maintain secure and resilient IT environments.
Cyber Technology Insights: EPAM Joins Microsoft Intelligent Security Association to Strengthen Cybersecurity Collaboration
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com





