Home / Technology / Microsoft's 26-Year-Old Security Flaw Finally Dying
Microsoft's 26-Year-Old Security Flaw Finally Dying
16 Dec
Summary
- Microsoft deprecates RC4 encryption, supporting it for 26 years.
- RC4 was exploited in major breaches, including the Ascension healthcare attack.
- By mid-2026, Windows servers will default to more secure AES-SHA1 encryption.

Microsoft is phasing out the RC4 encryption cipher, a standard that has been supported by default in Windows for 26 years. This move comes after decades of known vulnerabilities and recent criticism regarding its exploitation in significant cyberattacks, including the breach at Ascension.
The company announced that by mid-2026, Windows Server defaults for Kerberos authentication will shift to the more secure AES-SHA1 encryption. RC4 will be disabled by default, requiring administrators to actively configure its use if necessary, a measure aimed at enhancing network security.
This deprecation is a complex undertaking due to RC4's long history and widespread implementation. Microsoft is providing tools, such as updated KDC logs and PowerShell scripts, to help administrators identify and transition any systems still relying on this outdated cipher, ensuring a smoother migration to more robust security protocols.



