Announcement on the Windows Domain Control Server Issue Caused by Patches Released by Microsoft in January

According to an announcement from Microsoft on January 13, 2022, the installation of security patches released by Microsoft in January 2022 may pose the following risks: Virtual machines that are created from Hyper-V cannot start, Windows Servers domain controllers cannot restart or go into a restart loop, and IPSec VPN connections fail. The following versions of Windows Server are affected by the issue:
Windows Server 2022
Windows Server, version 20H2
Windows Server 2019
Windows Server 2016
Windows Server 2012 R2
Windows Server 2012

The relevant patches have been removed from the Windows Server Update Services (WSUS) provided by Alibaba Cloud. To prevent your operating system from being affected by the issue, run one of the following cmd commands based on the version of your operating system to check whether these patches have been installed:
Windows Server 2012 R2: wmic qfe get hotfixid | find "5009624"
Windows Server 2019: wmic qfe get hotfixid | find "5009557"
Windows Server 2016: wmic qfe get hotfixid | find "5009546"
Windows Server 2012: wmic qfe get hotfixid | find "5009586"
Windows Server 2022: wmic qfe get hotfixid | find "5009555"

If these patches have been installed on your operating system and Windows Servers domain controllers cannot be used or virtual machines cannot start, we recommend that you uninstall the patches. Run one of the following cmd commands based on the version of your operating system to uninstall the patches:
Windows Server 2012 R2: wusa /uninstall /kb:5009624
Windows Server 2019: wusa /uninstall /kb:5009557
Windows Server 2016: wusa /uninstall /kb:5009546
Windows Server 2012: wusa /uninstall /kb:5009586
Windows Server 2022: wusa /uninstall /kb:5009555

For further updates and operational guidance on the issue, follow the official Microsoft instructions.
For more information, see https://docs.microsoft.com/en-us/windows/release-health/status-windows-10-1809-and-windows-server-2019#2775msgdesc.