Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical vm2 Node.js Flaws Allow Arbitrary Library Vulnerabilities
May 7, 2026
Hackers Used Claude AI to Attack Water & Drainage Utilities
May 7, 2026
Critical Ollama Memory Leak Exposes 300 Vulnerability Servers
May 7, 2026
Home/CyberSecurity News/Windows 11 PCs Fail to Shut Down After January Security Update
CyberSecurity News

Windows 11 PCs Fail to Shut Down After January Security Update

Microsoft’s January 13, 2026, security update for Windows 11 has reportedly introduced a critical flaw. Systems impacted by the patch are failing to shut down or hibernate as intended, instead...

David kimber
David kimber
January 16, 2026 2 Min Read
1 0

Microsoft’s January 13, 2026, security update for Windows 11 has reportedly introduced a critical flaw. Systems impacted by the patch are failing to shut down or hibernate as intended, instead performing an unexpected restart.

The issue is caused by KB5073455, which targets OS Build 22621.6491 on Windows 11 version 23H2. It was first reported on January 15 and arises from interference with Secure Launch, a virtualization-based security (VBS) feature designed to protect boot processes from firmware threats such as rootkits.

Secure Launch, part of Windows’ System Guard suite, verifies the firmware environment during startup using hypervisor-protected code integrity.

Isolating the core root of trust measurements prevents persistent malware from tampering with the pre-OS environment. Ironically, this month’s patch, intended to bolster defenses, disrupts the feature, blocking proper power-off states on compatible hardware.

Affected Systems and Scope

The glitch affects only the Enterprise and IoT editions of Windows 11 23H2, sparing the consumer Home and Pro variants. No server platforms, such as Windows Server, face disruptions.

Microsoft confirmed the problem via its support portal, last updated January 15 at 19:01 PT. Systems must have Secure Launch enabled, a common setup in high-security enterprise deployments that rely on VBS to meet compliance standards such as NIST or zero-trust architectures.

Admins in regulated sectors, including finance and government, report the issue across fleets, raising concerns over power management reliability.

While not a vulnerability itself, the bug exposes risks: devices stuck in restart loops drain batteries faster, potentially leading to data loss or unattended uptime that amplifies exposure to unpatched threats.

Microsoft offers a temporary fix for shutdowns via Command Prompt: launch cmd from the Search bar and run shutdown /s /t 0. This forces an immediate power-off, bypassing the GUI failure. Hibernation lacks a workaround; users must save work and opt for full shutdowns to prevent unexpected power loss.

The company promises a fix in an upcoming update and urges IT teams to monitor Windows Update channels. In the interim, disabling Secure Launch via Group Policy (Computer Configuration > Administrative Templates > System > Device Guard) restores functionality but weakens boot integrity—a trade-off for threat hunters weighing the risks of firmware attack vectors.

This incident underscores the double-edged sword of monthly Patch Tuesday rollouts. As enterprises patch for zero-days, such regressions highlight the need for staged testing, especially on security-hardened configs.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarePatchSecurityThreatVulnerabilityzero-day

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Cloudflare Acquires Astro Web Framework to Boost Development

Next Post

Researchers Access StealC Malware Command-and-Control Systems

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Massive 2.45B-Request DDoS Attack Used 1.2 Million IPs to Evade
May 7, 2026
Google Chrome 148 Released with Fix for 127 Security
May 7, 2026
Salat Malware Uses QUIC & WebSocket for Stealth Channels Stealthy
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us