Loading...
Loading...
Recent Windows updates are causing access and security headaches across Windows 10, Windows 11 and Server builds. Researchers and community posts flag system user access changes following the April 2026 update, while Microsoft has confirmed two Windows 11 patches (KB5083769, KB5082052) can wrongly trigger BitLocker recovery, forcing users to supply recovery keys. Together these reports underscore growing concerns about update regressions that disrupt boot, encryption and user access, affecting both consumers and enterprise IT. Organizations should monitor vendor advisories, apply mitigations, and postpone noncritical rollouts until fixes are validated to avoid productivity and data-availability risks.
Windows updates that change system access or trigger BitLocker recovery can halt user productivity and complicate incident response. Tech professionals must balance patch deployment with risk of boot failures and encryption lockouts across endpoints and servers.
Dossier last updated: 2026-05-13 05:22:10
A researcher disclosed a critical BitLocker bypass in Windows Recovery Environment (WinRE) that can yield an elevated shell with access to BitLocker-protected volumes. By placing a crafted FsTx folder into a drive’s System Volume Information (or copying it into the EFI partition), then rebooting into WinRE with a specific key-sequence (hold SHIFT while clicking Restart, then release and hold CTRL), the attacker obtains an unrestricted shell that can access encrypted volumes. The issue appears limited to Windows 11 and Server 2022/2025 images and involves a component present only in WinRE with behavior absent from normal installs, raising concerns about intentional design or an extreme oversight. Microsoft and security teams (MORSE, MSTIC, GHOST) were thanked for coordinated disclosure.
Microsoft released the May extended security update KB5087544 for Windows 10 Enterprise LTSC and devices enrolled in ESU, raising builds to 19045.7291 (ESU) and 19044.7291 (LTSC). The cumulative update fixes 120 vulnerabilities — including 14 remote code execution, 61 privilege escalation, and other severity classes — but no zero-days. It also fixes a remote desktop warning display bug introduced by April’s patch (affecting multi-monitor, mixed-DPI .rdp sessions), enhances Windows Security to show dynamic Secure Boot state and expands coverage for new Secure Boot certificates. Microsoft warns some devices may prompt for BitLocker recovery keys after install and provides a temporary mitigation; a permanent fix is pending. This matters for enterprise stability and security posture.
RedSun: System user access on Win 11/10 and Server with the April 2026 Update | Hacker News Hacker News new | past | comments | ask | show | jobs | submit login RedSun: System user access on Win 11/10 and Server with the April 2026 Update ( github.com/nightmare-eclipse ) 5 points by airhangerf15 58 minutes ago | hide | past | favorite | discuss help Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact Search:
Microsoft confirmed that two recent Windows 11 updates—KB5083769 and KB5082052—can incorrectly trigger BitLocker recovery on affected machines, forcing users to enter recovery keys to boot. The company acknowledged the issue, pointed to specific update packages, and is investigating while advising impacted users on mitigation steps. This matters because unexpected BitLocker recovery interrupts productivity, risks data access for enterprises and consumers, and complicates device management for IT teams. The incident highlights the risk of security feature regressions in OS updates and underscores the need for careful rollout and rapid remediation of updates that affect disk encryption and boot processes.