• Thread Author
Windows 10 users are no strangers to the occasional hiccup associated with feature and security updates, but the May update for Windows 10, known as KB5061768, has created an unusually thorny problem that could impact data accessibility and system stability—especially for those relying on business-grade security hardware. This isn’t just a casual inconvenience; for certain laptops, especially those equipped for enterprise use, the bug could lock users out of their own systems, with the only remedy requiring uncomfortable BIOS adjustments and a keen awareness of cryptographic recovery protocols.

Understanding the May Update Bug​

The crux of the issue lies within the mechanics of Windows’ update process. While patches are designed to enhance security and compatibility, the May Windows 10 update inadvertently introduces a bug that can cause the upgrade process to repeatedly fail on affected devices. According to multiple user and expert reports, instead of a seamless transition to the latest build, the update attempt crashes a crucial system process—lsass.exe (Local Security Authority Subsystem Service)—which is responsible for enforcing security policies. When lsass.exe unexpectedly terminates, Windows responds by entering an automatic repair loop; the system attempts to recover and restart, only to fail again, sometimes cycling through this sequence multiple times before finally rolling back to a previous state.
While rollback mechanisms are meant to keep users from losing access or experiencing data loss, the interplay with device encryption amplifies the threat profile. On laptops with BitLocker or Device Encryption turned on, this bug can leave users staring at a recovery screen demanding a BitLocker recovery key before any meaningful action can continue.

Who Is at Risk? Focus on Intel vPro Machines​

One crucial mitigation is that this bug is not universal. The primary trigger for the problematic behavior is the presence of Intel vPro processors—specifically, Intel’s 10th-generation (or later) vPro CPUs, which bundle in advanced security features like Trusted Execution Technology (TXT). Intel vPro is common in business-class laptops but far less so in everyday consumer models.
In its advisory, Microsoft clarifies: "Consumer devices typically do not use Intel vPro processors and are less likely to be impacted by this issue." Contingency, however, is not preparation—some higher-end consumer notebooks also ship with vPro features, so it’s wise for all Windows 10 users to check their system’s hardware profile before taking the May update.
To determine whether your PC has a vPro processor:
  • Open Settings > System > About.
  • Under "Device specifications," note the processor details. A model number like “i5-10400 vPro” or newer indicates risk.
  • Alternatively, check the manufacturer's documentation.

Why vPro and TXT Are Problematic Here​

The bug specifically targets systems where Intel Trusted Execution Technology is enabled. TXT adds hardware-based security, providing additional root-of-trust for running sensitive workloads, primarily in business contexts. When the update interacts with TXT, it creates an unstable scenario for the Windows security stack and triggers the aforementioned repair loop.
Additionally, Device Encryption or BitLocker complicate the issue dramatically. BitLocker, a Microsoft technology for securing data through full-disk encryption, requires a recovery key to unlock the drive whenever it detects a hardware or firmware change—such as toggling security features in BIOS, or, ominously, when it thinks the OS has been tampered with.

The Emergency Fix: Applying KB5061768​

Microsoft’s response to the developing crisis has been swift and targeted. The company rushed out an emergency patch—KB5061768—intended to preemptively resolve the underlying issue before users ever experience system lockout. However, there’s a catch: this fix is not delivered through the usual Windows Update channels. Instead, affected users must download and install it manually from Microsoft’s Update Catalog.
How to Apply the Emergency Fix:
  • Go to the Microsoft Update Catalog.
  • Search for “KB5061768.”
  • Download the correct version for your system (most users will want the “Windows 10 version 1903 and later” for x64, but verify your system type).
  • Run the installer manually.
It’s essential to install this patch before undertaking the main May update (Windows 10 22H2). If you install the cumulative update first and encounter the glitch, a simple fix becomes a much more complex recovery operation.

Locked Out? Here’s What to Do​

For the unfortunate users who have already applied the May update and find themselves locked out by the recovery screen, the solution involves navigating the system BIOS—a nerve-wracking prospect for less technical users.

Recovery Steps If You’re Already Affected​

  • Access the BIOS/UEFI:
  • Reboot your computer.
  • During early boot (before Windows loads), repeatedly press the BIOS access key—commonly F2, F10, or F12. The correct key varies by manufacturer.
  • Locate Intel Trusted Execution Technology Setting:
  • Within the BIOS, look for a section labeled Security, System Security Settings, or Virtualization.
  • Seek out a setting named “Intel Trusted Execution Technology (TXT).”
  • Disable (turn off) TXT. It’s reported that you do not need to adjust “Intel VT for Direct I/O”; you can leave it enabled.
  • Save and Exit the BIOS:
  • Confirm saving changes.
  • Exit and allow the PC to reboot.
  • Boot into Windows:
  • If successful, Windows 10 should start normally, bypassing the recovery screen.
  • Immediately apply the emergency KB5061768 fix as above.
  • (Optional) Re-enable TXT:
  • If your IT policy or security needs require TXT, you can re-enter BIOS after patching Windows and turn Intel TXT back on.
Note: If BitLocker or Device Encryption is turned on, the system may again request the recovery key upon BIOS changes. Always have your recovery key available before making any BIOS modifications.

Why Is BitLocker Causing So Much Trouble?​

BitLocker is designed to protect data by creating a cryptographic barrier; any hardware or firmware change can appear as a security threat, triggering the need for a recovery key. This forces a kind of failsafe: unless the correct key is produced, data access is withheld, preventing potential attackers from extracting information from a stolen or tampered device.
However, the flip side of this protection is a lack of user friendliness in emergency situations. If you don’t have your recovery key at hand—especially in a corporate setting where keys may be managed by an IT department or linked to an institutional Microsoft account—you’ll be locked out. For personal users or small businesses, BitLocker recovery keys should be securely backed up, ideally to your Microsoft account or in another secure, accessible location.
A critical wrinkle for Windows 11 users: fresh, clean installations of Windows 11 24H2 automatically apply Device Encryption and save the recovery key to your Microsoft account. This streamlines security but creates its own hazards if an account is deleted, as the recovery key is lost with it.

Unpacking Device Encryption and ‘Lite’ BitLocker​

Device Encryption represents a consumer-friendly, automatic implementation of BitLocker, primarily for Windows 11 Home users. Unlike the Pro and Enterprise editions—which allow granular configuration—Device Encryption provides basic protection for the system drive but does not cover other partitions or external disks. The takeaway: while Device Encryption and BitLocker both guard sensitive data, their management, recovery, and operational impacts during update glitches differ in subtle but important ways.

The Broader Context: Windows Update’s Ongoing Challenges​

This latest bug is not an isolated incident. Both Windows 10 and Windows 11 have experienced prior update-related snafus where encryption and system security collide with update mechanisms, sometimes locking out even advanced users. IT departments are all too familiar with the delicate balance between deploying critical security updates and avoiding system downtime due to unforeseen compatibility or process errors.
Moreover, Windows update cadence and cumulative patching—where patches stack atop one another—mean that new bugs can have wide-reaching, often unpredictable impacts, especially as hardware generations diversify and enterprise and consumer update appetites diverge.

Best Practices: Reduce Your Risk​

Security best practices for both individuals and organizations can help avoid these headaches:
  • Identify your hardware before each major Windows update. Especially check for Intel vPro or other business-centric features.
  • Back up BitLocker/Device Encryption recovery keys. Ensure they’re saved to your Microsoft account, a physical printout, or a secure password manager.
  • Pause significant Windows updates temporarily. If your system is affected, wait for emergency patches; Microsoft provides update pause options for a reason.
  • Apply critical out-of-band fixes as soon as they’re available. Emergency patches like KB5061768 are essential and almost never optional in situations like this.
  • If managing many devices in enterprise environments, lean on Windows Update for Business tools. These allow controlled update rollout and the ability to halt updates if a severe bug manifests.

Critical Analysis: Strengths and Pitfalls​

Strengths​

Microsoft's prompt reaction with an emergency fix demonstrates a matured response protocol. By quickly identifying the intersection of hardware-specific features (like Intel vPro TXT) and software update processes, Microsoft limited the spread and possible impact among broader user bases. The user and IT admin advisories are now upfront about the scope and prerequisites of the bug, improving transparency.
Introducing automatic Device Encryption for newer Windows clean installations is a positive evolution from a security perspective, nudging more users toward good data hygiene. BitLocker’s protective mechanisms are working as intended—they react to hardware changes and potential tampering.

Potential Risks and Weaknesses​

  • Complex Recovery Procedures: The need to deep-dive into BIOS settings, particularly the nuanced requirement to disable only TXT (and not VT for Direct I/O), is daunting for non-technical users. A misstep here can risk further system instability or even data loss.
  • Recovery Key Management: If recovery keys are mishandled or simply forgotten, users may be permanently locked out of their data. This is doubly dangerous for small businesses or individuals without IT support.
  • Opaque Update Channels: Many users expect all critical patches to be deployed automatically. The need for manual download and installation of KB5061768 increases the risk of users being exposed before they are even aware of the issue.
  • Enterprise Complications: Businesses that roll out updates en masse could see simultaneous outages across entire device fleets—a nightmare scenario for IT departments managing vPro-based laptops.

Moving Forward: Microsoft, Intel, and the Update Ecosystem​

This incident is a stark reminder of the intricacies involved in modern hardware-software interaction. As Windows continues to serve as the backbone for both business and personal computing, every incremental jump in system security and update automation brings with it new edge cases—each potentiated by the diversity and sophistication of today’s hardware.
For users, the clear advice is to stay informed about what’s happening under the hood. Know your device’s hardware profile. Guard your recovery keys jealously. And never click through a feature update on autopilot—especially if you see advisories for your CPU or encryption settings.
For IT professionals and enthusiasts tracking Windows update reliability, monitoring emergency patch rollouts and fostering a readiness to revert and recover are skillsets as vital as deploying the latest software innovations.

Final Takeaway​

Windows 10’s May update drama is a potent illustration of how even routine software maintenance, when mixed with enterprise-level hardware and modern encryption, can deliver significant challenges. The fallout from such bugs is rarely universal but can be catastrophic for those caught in the crosshairs. Manual emergency fixes, BIOS navigation, and careful recovery key stewardship are now part of the update lexicon—an ongoing reality for anyone striving to balance security, usability, and the relentless march of software progress.
Vigilance, preparation, and a willingness to pause and research before hitting “Install” are the unsung defenses in this new era of Windows device management. For those willing to take those steps, even the nastiest Windows 10 update bug is manageable. For everyone else, a little awareness now could save hours of frustration later.

Source: TechRadar Windows 10’s latest update packs a nasty bug, and while your system might be safe, it’s vital you check now
 
How about Surface devices? They don´t have these options in their BIOS. I´m trying with a Surface Pro 6 that´s in the bitlocker recovery process, trying to exit out of it and going to Windows, but these options aren´t available in Bios.
 
You're absolutely right—Surface devices have a much more limited UEFI (BIOS) compared to traditional PCs. Standard options for TPM or Secure Boot management are simplified or sometimes completely hidden. When stuck in BitLocker recovery on a Surface Pro 6, here's what you can do:

1. Ensure You Have the BitLocker Recovery Key​

First and foremost, you'll need your BitLocker recovery key. Without it, you cannot exit recovery mode. You can find it:

2. Why Surface Devices Get Stuck​

Surface Pros can get stuck in BitLocker recovery if:
  • The UEFI (BIOS/firmware) was reset or updated
  • Secure Boot or TPM configurations changed
  • A Windows update modified boot settings
  • The SSD was removed or NVMe configurations changed

3. Exiting BitLocker Recovery on a Surface Pro 6​

  • Enter your recovery key when prompted.
  • If successful, Windows should start up.
  • If recovery keeps looping, try the following steps:

Check UEFI Settings (on Surface Devices)​

  1. Shut down the Surface completely.
  2. Hold Volume Up and press Power to enter UEFI.
  3. In UEFI, make sure:
    • “Trusted Platform Module (TPM)” is enabled under Security.
    • “Secure Boot Control” is enabled under Boot Configuration.
You won’t see many traditional options here—but make sure those are enabled.

Save and Restart​

  • Exit with changes saved.
  • Reboot and try entering the recovery key again.

If It Loops Back to Recovery​

  • If you've made changes and it's still stuck, sometimes the BitLocker protector gets corrupted, especially after firmware updates.
  • Boot from a Windows 10 USB installation media using the Surface (hold Volume Down + Power to boot from USB).
  • Use the troubleshooting options to attempt a startup repair, or run this in command prompt:
    Code:
    manage-bde -unlock C: -RecoveryPassword <YourRecoveryKey>
    manage-bde -protectors -disable C:
    This unlocks and tries to temporarily suspend BitLocker, letting the system boot.

Still Stuck?​

  • If it continually asks for the recovery key, you may need to backup data using a bootable USB (like Windows PE) and then reset or reinstall Windows.

Let me know which step gets you stuck or if you see any error messages when entering your recovery key. I can guide further based on your Surface’s exact behavior!