Are the users themselves authenticating via 802.1X, or is the computer authenticating via 802.1X using something like a machine certificate?
We use computer auth via machine certificate, and had some trouble with Windows 11 in-place upgrades. It had to do with part of the upgrade process (a task sequence via MECM, I believe) performing a NIC driver upgrade as part of the task sequence. This NIC driver update wiped out the 802.1X machine authentication settings that we applied to the "ethernet" connection via Group Policy. Once the settings were wiped, the machine would get kicked off the network, thus group policy couldn't enforce the 802.1X configuration. Bit of a catch22.
Our MECM admin ended up adding a step to the task sequence to force the settings back into place after the NIC driver was upgraded.
A more general, common culprit is that the "Wired Autoconfig" service can get disabled, it's worth checking if that's what's going on.
EDIT: After re-reading your initial post, I wonder if these are in-place upgrades or are these wipe-> fresh images? If these are being wiped and given a fresh image, are you re-applying the 802.1X configuration in Windows?