A Microsoft account lockout is blocking WireGuard updates on Windows

WireGuard, one of the most widely used open source VPN technologies in the world, is unable to ship Windows updates after its developer was locked out of a key Microsoft account. According to TechCrunch, WireGuard creator Jason Donenfeld said the account restriction prevents him from signing drivers and delivering software updates required for the Windows version of the software to run.

The immediate issue is operational, but the implications are broader. WireGuard is not a niche tool. Its code underpins VPN implementations and commercial services used by consumers, companies, and privacy-focused organizations. TechCrunch reported that services including Mullvad, Proton, and Tailscale rely on WireGuard’s technology. When the maintainer of such a foundational project loses access to the platform controls needed to distribute updates, the disruption can ripple far beyond a single download page.

Donenfeld said the problem surfaced just as he had finished modernizing WireGuard’s Windows code and was preparing to submit an update to Microsoft for checks ahead of release. Instead of proceeding, he encountered an “access restricted” error when logging into the developer portion of his account. He also said that despite completing identity verification through Microsoft’s third-party process, his access remained suspended.

Why the lockout matters for security

For security software, the inability to ship updates is not just an inconvenience. It can become a risk. Donenfeld told TechCrunch that there was no critical vulnerability requiring an immediate fix at the time, but he added that if one did emerge, users would be exposed because the project could not send out the necessary patch.

That comment underscores a central problem with modern software distribution. Many developers, especially those building drivers or low-level system software, rely on a small number of gatekeepers to sign code, approve submissions, and maintain trusted delivery channels. Those controls exist for legitimate security reasons, but they also create single points of failure. If access is cut off suddenly, even reputable and widely used projects can be sidelined.

In WireGuard’s case, the Windows Hardware Program is a critical part of that chain. TechCrunch reported that Donenfeld found a Microsoft webpage stating that the company had been carrying out mandatory account verification for partners in the program who had not completed verification since April 2024. He also said the verification program had since closed, leaving him in a difficult position despite being marked as verified by the outside provider handling identity checks.

The result is a mismatch between compliance and continuity. A developer can be told to verify, complete the verification process, and still remain unable to access the tools required to deliver updates. For open source projects with limited administrative staff, that kind of limbo is especially disruptive.

WireGuard is not the only project affected

The incident appears to fit a wider pattern. TechCrunch reported that encryption software project VeraCrypt is facing a similar issue after its developer, Mounir Idrassi, was also locked out of a Microsoft account without prior warning. In VeraCrypt’s case, Idrassi said the loss of access prevents the project from updating software in time for an important certificate authority expiry, a problem he warned could stop some users from booting their systems.

That comparison raises the stakes considerably. WireGuard and VeraCrypt are both high-profile security tools with large installed bases. If both projects were locked out without advance notice, the issue starts to look less like an isolated support mishap and more like a structural weakness in how platform verification and developer access are managed.

The fact that both are open source projects also matters. Such projects often support critical parts of the software ecosystem while operating with far fewer administrative resources than major corporations. A large vendor may have direct partner managers, compliance teams, and legal contacts to resolve an abrupt account suspension. An independent open source maintainer may have little more than a web form, a verification portal, and a growing line of users waiting for updates.

Platform dependence is becoming a supply-chain issue

WireGuard’s predicament illustrates a less visible part of software supply-chain security: distribution rights. Much attention is paid to vulnerabilities in code, malicious packages, or compromised dependencies. But secure software also depends on trusted, functioning release pipelines. If a project cannot sign a driver or publish an update, it cannot maintain the security posture users expect.

That makes account governance at large platforms more consequential than it may first appear. An opaque suspension process can become a supply-chain choke point. When the software involved is foundational networking or encryption infrastructure, the downstream effects can include delayed fixes, compatibility problems, and user uncertainty about whether a project is still being maintained properly.

The episode also highlights an uncomfortable asymmetry. Platform companies impose strict controls in the name of ecosystem safety, but developers can still be left with little visibility into why an account was restricted, what evidence triggered the action, or how quickly remediation will happen. From a security standpoint, that lack of procedural clarity is itself a risk.

None of this means verification programs are unnecessary. Driver signing and identity checks are important safeguards. But the WireGuard case suggests that safeguard design has to include continuity mechanisms for legitimate developers, especially when their tools are widely relied upon. Warning periods, clearer appeal paths, and dedicated handling for critical infrastructure projects would all reduce the chance that administrative enforcement creates avoidable downstream exposure.

What users should watch next

TechCrunch reported that Donenfeld has spent weeks working on the Windows modernization effort that is now stalled. The next key question is how quickly Microsoft restores access or otherwise enables WireGuard to continue its normal release process. The answer will matter not just to WireGuard users, but to developers across the ecosystem who depend on Microsoft-controlled signing and distribution workflows.

The case is also likely to intensify scrutiny of how major platforms treat open source maintainers whose projects serve essential security functions. When account systems fail quietly, users often only notice once updates stop arriving. By that point, the damage is already operationally significant.

For now, the most important fact is straightforward: a critical part of WireGuard’s Windows release pipeline is frozen because its developer cannot access the account needed to sign and ship updates. In software security, that is not a background administrative problem. It is a front-line reliability problem that can quickly become a public safety issue for the digital infrastructure people depend on every day.

This article is based on reporting by TechCrunch. Read the original article.