Share via

Windows Update getting failed = 2026-01 Security Update (Hotpatch capable) (KB5078167) (26100.7634) Some update files are missing or have problems. We'll try to download the update again later. Error code: (0x80073712)

SushilUmberkar-6954 0 Reputation points
2026-02-18T15:24:08.0433333+00:00

2026-01 Security Update (Hotpatch capable) (KB5078167) (26100.7634) Some update files are missing or have problems. We'll try to download the update again later. Error code: (0x80073712)

We have reported by multiple users that this updates gets failed. And after some days this system gets into non-compliant.

  1. This update not available in Windows Update Catalog
  2. we tried clearing windows updates cache and tried again installing but again failed
  3. we stopped windows update service renamed Software distribution folder and started windows update service and tried to update again but still same
Windows for business | Windows Client for IT Pros | Devices and deployment | Install Windows updates, features, or roles
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. VPHAN 24,530 Reputation points Independent Advisor
    2026-02-22T07:11:05.45+00:00

    Hello SushilUmberkar-6954,

    Following up on your issue, in my previous response, I emphasized that error 0x80073712 indicates missing payload fragments, pointing out that since hotpatches like KB5078167 rely entirely on Unified Update Platform channels, you must ensure your distribution points have the correct .wim and .psf MIME types configured. I also stressed the necessity of having the exact prerequisite baseline Cumulative Update installed, as hotpatches map memory directly and will fail if the component store delta is mismatched. Reevaluating this scenario against the widespread manifestation of ERROR_SXS_COMPONENT_STORE_CORRUPT, which translates to the 0x80073712 hex code, across your environment despite rebuilding the SoftwareDistribution folder, the root cause extends beyond local client caching or simple network drops.

    Best practice dictates running the Deployment Image Servicing and Management tool via the command DISM /Online /Cleanup-Image /RestoreHealth to repair the WinSxS component store inconsistencies causing this specific missing-file failure. However, official Microsoft servicing documentation explicitly outlines that hotpatch installations will systematically fail with missing file errors if the endpoint servicing stack is out of sync with the mandated quarterly baseline. Given that KB5078167 is intentionally excluded from the Update Catalog and multiple clients are entering a non-compliant state simultaneously, this confirms a known Unified Update Platform metadata synchronization defect for the 2026-01 Hotpatch release originating from Microsoft's distribution infrastructure. Since local client remediations cannot reconstruct flawed upstream UUP metadata, you must pause the specific deployment ring targeting this hotpatch in your management console to halt further compliance degradation. You must wait for Microsoft to supersede this specific hotpatch package with the upcoming standard full Cumulative Update payload, which circumvents the hotpatch delta requirements entirely and overwrites the servicing stack with a complete, healthy state.

    Hope this answer brought you some useful information. If it has, please consider accepting the answer so that other people sharing the same issue would benefit too. Thank you :)
    VP

    0 comments No comments

  2. VPHAN 24,530 Reputation points Independent Advisor
    2026-02-18T17:37:04.3266667+00:00

    Hello SushilUmberkar-6954,

    To formulate the most optimal remediation path, I need to know the specific update management architecture you are utilizing to deploy this, such as Windows Server Update Services (WSUS), Microsoft Endpoint Configuration Manager (MECM), or Windows Update for Business via Intune. Furthermore, you must verify the exact OS build number that was installed prior to this failure. Hotpatches don't contain the full servicing payload, they are delta updates that require the host environment to be situated on a strictly defined prerequisite baseline build to map the memory correctly.

    Because KB5078167 is categorized as a Hotpatch, it is intentionally excluded from the Microsoft Update Catalog and relies entirely on native UUP deployment channels. If your environment leverages on-premises WSUS or MECM, this missing files error is frequently caused by missing UUP MIME types in the Internet Information Services (IIS) configuration of your distribution points. You must verify that the .wim and .psf file extensions are explicitly allowed and registered. If they are not, IIS will silently drop the payload fragments during the client synchronization phase, instantly triggering the 0x80073712 missing files error on the endpoint.

    You can confirm exactly which payload fragment the Windows Update agent failed to fetch by reviewing the C:\Windows\Logs\CBS\CBS.log file for unresolved package identities. If your IIS configuration is correct and the endpoints already possess the required baseline update, this widespread failure strongly indicates a payload metadata synchronization bug with KB5078167 itself on Microsoft's end. If this is the case, you must pause the affected deployment rings to prevent further compliance degradation and wait for Microsoft to release a revised Out-of-Band update or roll the patch into the superseding cumulative update.

    Hope you found something useful in the answer. If it helped you get more insight into the issue, please consider accepting it. Thank you and have a nice day!

    VP


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.