Home Software Blog FAQ About Contact ⬇ Download Free
← Back to Blog
Guide

Windows 11 KB5083769 Update — What's Really Broken, What's Not

📅 May 2, 2026 · 9 min read · By Rai

My first instinct when KB5083769 dropped on April 14 was to install it on the test machine, run a quick QA pass on RBS PC Cleaner against the new build, and move on. By the long weekend I had three different "Windows 11 death loop" videos in my YouTube feed and at least one backup vendor I respect publicly telling their customers to hold off on the update. So I spent two days reading the actual Microsoft KB article, checking Event Viewer on the three Windows 11 machines I have here, and trying to separate the real bugs from the noise. Here is the picture as of early May 2026.

Short version up front: there are two confirmed regressions — one of which only affects you if you run a specific kind of backup software — plus a driver-level Wi-Fi/Bluetooth issue Intel has already shipped a fix for. The viral "BSOD death loop" headlines turned out to trace back to about five forum posts that AI-content sites mass-reproduced into a hundred articles. Don't roll the update back on the basis of headlines alone — there are 167 security fixes in this one and you would be discarding all of them.

What KB5083769 actually is

April 14, 2026 cumulative update for Windows 11 versions 24H2 and 25H2. After install your build number is 26100.8246 (24H2) or 26200.8246 (25H2). You can check by hitting Win + R and typing winver.

Beyond the 167 security patches it brings a few small but genuinely nice things:

  • The sfc /scannow command finally reports its actual status. For years it would report errors that didn't exist, which scared people into running unnecessary repairs.
  • Monitors can advertise refresh rates above 1000 Hz. Niche, but the new high-refresh OLEDs need it.
  • Voice typing (Win + H) now works while renaming a file in File Explorer.
  • Smart App Control can finally be toggled on or off without reinstalling Windows.
  • RDP files have a one-time security warning the first time you open them, and connection settings default to off — closes a phishing vector that's been abused for a couple of years.

So this isn't an unimportant update. That's why "just uninstall it" isn't free advice.

The real problem: VSS / third-party backup failures

The Volume Shadow Copy Service is what lets backup tools take a consistent snapshot of an in-use disk. After KB5083769 it can time out during snapshot creation when called by certain third-party backup tools. Vendors that have publicly confirmed they're hitting this:

  • Acronis Cyber Protect Cloud
  • Macrium Reflect
  • NinjaOne Backup
  • UrBackup Server

If you want to confirm the bug on your own machine, open Event Viewer (Win + R, type eventvwr.msc), expand Windows Logs → Application, and filter by source "VSS". The signature is event ID 8193 or 12293, with text along the lines of "Volume Shadow Copy Service error: Unexpected error calling routine IOCTL_VOLSNAP_FLUSH_AND_HOLD_WRITES". If you don't see those events, your VSS chain is fine.

Microsoft has acknowledged the regression and an out-of-band fix is in the pipeline. Until that lands, your options are:

  • Check with your backup vendor first. Acronis and Macrium have both published guidance — sometimes a setting tweak (longer VSS timeout, or switching to crash-consistent snapshots) is enough.
  • Pause backups for a few days if your data isn't changing fast. Less drastic than rolling the whole update back.
  • Roll back KB5083769 only if you have to. See the section below.

If you only use Windows' built-in File History or OneDrive sync, you're not affected — those don't go through the same VSS path.

BitLocker recovery screen on a narrow set of machines

Microsoft confirmed a second regression that triggers the BitLocker recovery screen after the update on machines using a specific Group Policy configuration that Microsoft itself describes as "unrecommended". For most consumer machines this won't fire. For business / domain-joined laptops with strict policies, it might.

If it does happen to you, you'll be asked for the 48-digit BitLocker recovery key. If you signed in to Windows with a Microsoft account when you set the machine up, that key is sitting at aka.ms/myrecoverykey right now. If you didn't, or you bought the laptop second-hand and never linked the account — that's the real problem to fix today, not next time. Get into Manage BitLocker in Control Panel and back the key up to a USB stick, your Microsoft account, or both.

Intel Wi-Fi and Bluetooth conflicts

Intel acknowledged a separate issue at the driver level — Wi-Fi and Bluetooth competing for the same 2.4 GHz channel, which shows up as Bluetooth audio dropouts or random Wi-Fi disconnects, especially on laptops. Intel rolled out a driver update at the end of April 2026.

Two ways to get the fix: install Intel Driver & Support Assistant from intel.com and let it find the new driver, or check your laptop maker's support site (Dell, HP, Lenovo, Asus all push their own validated builds — usually a few weeks behind Intel direct, but better tested for your specific machine). If you don't have an Intel Wi-Fi card, this section doesn't apply to you.

The BSOD "death loop" rumour — mostly noise

This is the headline that actually made me write this post. By April 22 there were dozens of articles claiming KB5083769 was "trapping PCs in death loops" with "pixelated BSODs" and so on. WindowsLatest dug into the source of these claims and found that almost all of them traced back to a single Microsoft Q&A thread with about five named users. Microsoft told the same investigator they were not aware of any critical, widespread issue with KB5083769.

That doesn't mean nobody on the internet had a real problem with this update — five people did, and a handful more probably did too. It does mean the scale of the headlines didn't match the scale of the actual reports. The pattern was AI-content sites scraping each other's "users are reporting…" stories into a feedback loop. You can usually spot these articles in the wild: lots of passive voice, no actual user names, no specific hardware, no Event Viewer screenshots.

Compare that to the VSS backup story, where Acronis, Macrium, NinjaOne and UrBackup all named the bug, gave the exact error code, and Microsoft acknowledged the regression. That's what a real Windows bug report looks like.

The 30-second check: am I actually affected?

  1. Win + R → type winver → press Enter. If your build ends in .8246, you have KB5083769 installed. If not, you don't, and none of this applies to your machine.
  2. If you run a third-party backup tool: Win + Reventvwr.msc → Windows Logs → Application → filter source "VSS" → look for events 8193 or 12293 in the last few days.
  3. If you have BitLocker on: open Control Panel → BitLocker → make sure your recovery key is backed up somewhere you can actually get to it from another device.

If steps 2 and 3 come back clean, the update is fine on your machine. Leave it.

How to roll KB5083769 back (only if you actually need to)

  1. Settings → Windows Update → Update history → Uninstall updates (the link is at the bottom).
  2. Find the row for KB5083769 → click Uninstall → reboot when asked.
  3. Once you're back up, return to Settings → Windows Update and pause updates for one week. That window almost always covers the out-of-band fix.

This rolls back the security patches too. It is a real cost, not a clean undo. If your only reason for considering it is "I read a scary headline", do steps 1–3 of the check above first.

The honest takeaway

KB5083769 is not the disaster it was being painted as on YouTube and the AI-content tier of tech blogs. It is also not entirely clean. If you run third-party backup software, you have a real problem to deal with this week. Everyone else, the right move is probably: install it, ignore the panic, but go find your BitLocker recovery key while you're thinking about it.

One small reason this whole thing matters to me: it's why every change RBS PC Cleaner makes is reversible. Every cleanup action has an undo. Every disabled startup entry is parked, not deleted, and can be restored exactly. Software you trust on your own machine should be honest about what it changed and how to put it back. Microsoft is mostly good about this with Windows Update — that "Uninstall updates" page exists precisely for weeks like this — but every layer of your system should give you the same out.