KB5073455 released January 13th. Two days later Microsoft confirmed it breaks shutdown and hibernation on Windows 11 enterprise PCs with Secure Launch enabled.
Your computer won't shut down. It just restarts. Over and over. Until the battery dies or you remember command-line syntax from 2003.
Microsoft's official fix:
C:> shutdown /s /t 0
For hibernation? "Save your work frequently."
That's it. That's the support.
I wasn't going to write about this—routine Patch Tuesday bug, probably fixed next month, whatever. But then I saw the list of what else broke in the past eight months and realized this isn't routine anymore. This is a pattern nobody's naming.
What Broke and Why It Matters
Secure Launch is virtualization-based security for enterprise PCs. Protects boot process from firmware malware. Microsoft pushes it for compliance—NIST standards, zero-trust architecture, the stuff regulated industries need.
KB5073455 breaks it. Shutdown button triggers restart instead. Hibernate fails. PC stays on draining battery.
Separately, KB5074109 (different January update) breaks Remote Desktop to Azure Virtual Desktop and Windows 365 Cloud PCs.
So January delivered: can't shut down, can't connect to cloud desktops, plus 100+ security patches you can't skip.
Install and break functionality, or skip and stay vulnerable. Great options.
The List I Started Keeping
- October: KB5066835 cut NVIDIA gaming FPS in half. Microsoft silent for five weeks until NVIDIA released workaround drivers.
- December: 24H2 update broke Auto HDR, crashed games. Microsoft halted rollout.
- May-June: Broke Fortnite and CS:GO. Acknowledged July 22nd. Fixed August.
- August: Emergency patches because Patch Tuesday broke Windows recovery tools.
- December: Message Queuing service failures.
- January: Shutdown doesn't work.
Six in eight months that I noticed. Probably more I didn't because they didn't affect systems I use.
When does this stop being "occasional bugs" and become something else?
Why This Probably Keeps Happening
Microsoft tests updates in preview rings before Patch Tuesday. Problem is Windows runs on infinite hardware combinations—different CPUs, firmware versions, security configs, enterprise policies.
Testing everything would take forever. So they test common setups, ship fast, catch edge cases through telemetry after millions install.
Which turns enterprise features into post-release beta tests. Features Microsoft actively sells for compliance.
I get the complexity argument. Genuinely. But Secure Launch isn't buried in Group Policy Editor under obscure settings. It's documented, promoted, required for certain compliance frameworks.
If QA doesn't catch "Shutdown button doesn't shut down," what exactly are they catching?
Speed vs. stability tradeoff. Microsoft chose speed because unpatched vulnerabilities are worse than broken functionality.
Maybe that's the right call. But when it's your laptop that won't hibernate and your battery dies mid-presentation because Microsoft's update broke power management—that's your problem, not theirs.
The Compliance Trap
This is what gets me: if you're IT at a financial services company, Secure Launch isn't optional. Compliance requires it. Auditors check for it.
KB5073455 deploys overnight. Morning help desk floods. "Laptop won't shut down." "Battery died even though I closed the lid."
Microsoft confirms the bug January 15th.
Your choices:
- Uninstall → PCs vulnerable to 100+ security flaws
- Keep it → everyone uses Command Prompt to shut down now
- Wait → "future update," no timeline
You pay for Enterprise licenses. You enabled the security feature Microsoft recommended. Now you're troubleshooting their QA failure.
And yeah, it'll probably get fixed February 11th (next Patch Tuesday). Unless that update breaks something else. Which based on recent history...
The Workaround If You Need It
Shutdown:
Win+R → type cmd → Enter
C:> shutdown /s /t 0
Hibernation:
No fix. Save frequently.
Check if you're affected:
Run msinfo32 → look for "Virtualization-based security Services Running" → see if "System Guard Secure Launch" is listed.
Why We Just Accept This Now
Here's what I don't understand: Microsoft's worth $3 trillion. Windows powers billions of devices. And monthly updates breaking basic functionality is just normal?
When NVIDIA drivers caused issues, people lost it. Game launches broken on day one? Reviews destroy them. Airline IT outage? Congressional hearings.
Windows updates break shutdown, gaming, remote desktop, recovery tools, message queuing services—and it's just "Patch Tuesday, what can you do?"
We've normalized it because not updating is scarier. Zero-days, ransomware, unpatched vulnerabilities. So we install buggy updates because staying vulnerable is worse.
Microsoft knows this. They know we'll install broken updates because the alternative is unacceptable. Which removes any real accountability. If customers can't credibly skip updates, what incentive exists to improve QA beyond "good enough that enterprises don't mass-revolt"?
Maybe that's just OS complexity at scale. Or maybe we've collectively decided systematic QA failures from a trillion-dollar company are fine as long as security patches eventually ship.
I honestly don't know which bothers me more.
The Thing I Keep Coming Back To
It's Friday afternoon. This article took longer than planned because I kept getting sidetracked looking up whether KB5073455 affects consumer Windows 11 (it doesn't, Enterprise/IoT only) and whether there's precedent for Microsoft shipping emergency hotfixes between Patch Tuesdays (there is—August 2025 recovery tool failures got one).
Will they do that for shutdown? Support docs say "future update." Probably means February 11th. Maybe March if February breaks something worse.
Enterprise customers will just deal with command-line shutdowns for a month. What else are they going to do?
And next month when Patch Tuesday ships, we'll all hold our breath wondering what breaks this time. Gaming performance? File Explorer? Printer drivers? Who knows!
That's normal now. That's just how Windows updates work. We've accepted it.
I'm not sure when that acceptance happened, but it did. And Microsoft's counting on it continuing.
Sources: Microsoft Release Health Dashboard (Jan 15-16, 2026), BleepingComputer, Forbes, The Register. I wasn't at Microsoft and don't have internal sources—this is based on public support documents and tech outlet reporting.