newsletter banner

ISSUE 21.04.F • 2024-01-22 • Text Alerts!Gift Certificates
You’re reading the FREE newsletter

Susan Bradley

You’ll immediately gain access to the longer, better version of the newsletter when you make a donation and become a Plus Member. You’ll receive all the articles shown in the table of contents below, plus access to all our premium content for the next 12 months. And you’ll have access to our complete newsletter archive!

Upgrade to Plus membership today and enjoy all the Plus benefits!

In this issue

PATCH WATCH: KB5034441 has led us astray, in a horrible way

Additional articles in the PLUS issue

PUBLIC DEFENDER: Microsoft is pushing Copilot AI out to you

LEGAL BRIEF: The hidden cost of WFH

COMMENTARY: Bing Chat is sorry


ADVERTISEMENT
Tech Brew

Tech Brew

Join the over 400K people reading Tech Brew – the free 3x/week email delivering the latest updates on the technology changing the business world. Check it and start getting smarter today!

Try it!


PATCH WATCH

KB5034441 has led us astray, in a horrible way

Susan Bradley

By Susan Bradley Comment about this article

What’s with this Windows recovery partition thing?

If you’ve been following along, you know we’ve been discussing the update associated with a BitLocker vulnerability (described in KB5034441) that may require a resizing of the Windows recovery partition to resolve.

Microsoft’s handling of this problem has been so terrible that I was driven to raise the MS-DEFCON level to 1, just the fifth time I’ve considered it necessary.

It turns out that the underlying problem is an update to the Windows Recovery Environment (WinRE). The problem surfaces when the existing recovery partition does not have enough space to hold the updated WinRE. More on that in a second.

First, a caveat. I do not believe that consumer users should be installing KB5034441 in the first place. This update fixes a vulnerability that allows attackers to boot into the recovery partition, then access a drive protected with BitLocker. Most consumers don’t have BitLocker enabled through their own actions, so I think very few consumers are affected. However, some PC manufacturers enable BitLocker out of the factory. Some caution is called for (MS-DEFCON 1, after all), but my recommendation is that consumers block the update until the dust settles.

Meanwhile, Microsoft’s handling of this update has been horrific. This is a classic one-size-fits-all update, but the risk associated with the vulnerability is not the same for all. For example, my computers at home do not have BitLocker enabled, nor do they have the hardware (TPM) necessary to support BitLocker’s encryption. The vulnerability requires the attacker to physically (not remotely) access the PC. Physical attacks against consumer PCs are highly unlikely, whether BitLocker is enabled or not.

So my home machines do not meet the criteria for the vulnerability, yet the patch is being pushed to me anyway. And when it runs, it fails.

Why it fails

The problem is space in the recovery partition. It’s a bit hard to grasp the details here (thanks again, Microsoft), but the update apparently requires 250MB of free space in the existing recovery partition. If that space is available, and even if your machine does not have BitLocker enabled, the update should install without error. One of my home computers had not one, but two, recovery partitions. The second of the two was the one that the system identified as the active recovery partition. Because it had less than 250MB free, the update failed.

How did I know it had less free space than needed? It’s a two-task process. The first is to discover which partition is the recovery partition, tricky on my PC with two recovery partitions. Here are the steps I used to make that determination, the same steps you can use to check yours:

  • Click the start button and type in PowerShell.
  • When the search result shows PowerShell, click the Run as administrator link.
  • Once PowerShell is launched, enter the following command: reagentc /info

REAgentC is a command-line interface in PowerShell for WinRE.

As shown in Figure 1, REAgentC identified the active recovery partition as partition 5 on disk 0.

REAgentC
Figure 1. REAgentC discloses which partition is the recovery partition.

The next task is getting the details about that partition. The easiest way is to use the Disk Management tool. You can launch it by pressing WinKey and typing Disk Management, then clicking the app name; or by right-clicking the Start button and selecting Disk Management from the menu. Figure 2 shows that result on the same computer:

Disk Management
Figure 2. Disk Management connects partition 5 with the visualization.

When either the volume name or partition in the visualization is clicked, both highlight and thus establish the relationship. In other words, the gray hatching means that the 521MB partition is partition 5. Unfortunately, there’s still a loose end and a huge point of confusion. In the Volume list in Figure 2, look to the far-right column with the heading % Free and notice that partition 5 is shown with 100% of the space free. It isn’t.

To discover that, I resorted to one more tool, which gave this result:

Another view of partitions
Figure 3. Another tool provides much-needed detail, but not quite enough.

In Figure 3, the fifth partition highlighted in light blue is partition 5, which we can tell only because  it’s listed last of five. But the report does show us that the partition has 49MB free, not enough for the WinRE update to complete successfully.

The tool I used was MiniTool Partition Wizard Free (at OlderGeeks.com). The full extent of this program is shown in Figure 4.

MiniTool
Figure 4. The MiniTool Partition Wizard free edition shows the correct partition sizes.

It’s a tool I’ve mentioned before, most recently in a post from December 2022. That post argues that Microsoft should be providing a built-in tool for partition tasks. That’s brought home even more forcefully as a result of the WinRE update failure.

Perhaps Microsoft will finally change its mind and provide such a tool, because Redmond’s solution is not easy to use. Microsoft did provide PowerShell scripts in its support post Updating the WinRE partition on deployed devices to address security vulnerabilities in CVE-2024-20666 (KB5034957); those scripts are clearly intended for IT administrators. But they may require the use of a somewhat obscure process to disable PowerShell security before the script is run, which is far from user-friendly.

Because of this complexity, I opted not to attempt the update on my second home PC — I’ll keep KB5034441 blocked. Because BitLocker problems are not likely to affect either of my two PCs, I’d rather wait and demand that Microsoft provide a consumer-friendly resolution to this mess.

I should add a personal note about this experience. I’m not easily confused about patches and updates, as you know. I handle IT admin tasks all the time. But I was frazzled by this experience. It was beyond confusing, and it burned at least one full day of my weekend. Then Will spent more time trying to figure out exactly what I was talking about, despite the fact that we’ve written about KB5034441 several times. If we get tangled up like this, what’s the average user to do?

There’s more fallout. I have no explanation for why my drive has two recovery partitions. I have no idea how the second one got there, so that means more research.

I am not comfortable advising you to resize your partitions. If you click on the wrong thing, you could accidentally delete your entire working hard drive. So I’m still going to strongly recommend that if you are not comfortable with resizing your partitions or using a partition tool to help, skip this update on your Windows 10 PCs. Fortunately, it’s a separate patch — you can use the BlockAPatch tools to hide the update.

Don’t worry if you can’t stop the update before it attempts to install. It will do no damage. It will merely attempt to install and fail. That doesn’t mean we can ignore it indefinitely; at some point, a future update may require this one. My hope is that Microsoft will step up between now and then.

So why are we patching WinRE, and what is it?

WinRE is the Windows Recovery Environment, which can be used to repair unbootable operating systems. It consists of the core booting elements so you can boot under the operating system. That’s a valid reason for wanting it on your computer. That’s the good thing.

The bad thing is that over the years, the recommended size needed for this core OS has changed. If your recovery partition is the last one on your drive, you are all set to adjust its size and give it more room. That’s because you can safely trim the end of the OS partition to come up with the extra space needed for a recovery partition. That task is more difficult when the recovery partition precedes the OS partition.

It’s important to remember that updates for WinRE can be included in cumulative updates, as they currently are for Windows 11. When that is the case, and the conditions for the installation of the WinRE update are not met, the entire cumulative update may fail to install.

Unfortunately, that means you will eventually need to resize the recovery partition. Again, I’m not recommending that now. When it becomes clear that this is an essential task, and Microsoft has not provided automation that allows mere mortals to apply the fix, I’ll have the details to you promptly.

To further reinforce my advice not to resize yet, I used a free partition tool on one of my impacted computers. After it ran, the recovery partition was no longer recognized. I fixed that by extracting WinRE.wim from a Windows 10 ISO, then forcing the system to repair itself with a fairly complex process. I’m not going to describe it because I don’t recommend you try it, but it illustrates the danger associated with the problem.

Patching recommendations for consumers

Having the WinRE on your system is wise, because it allows you to repair the booting of the computer. Without it, you will need to reinstall your operating system or restore from an image.

So, to repeat: I do not recommend this update for consumers. Just wait.

One thing I do recommend is a check of Windows 11 PCs to determine whether BitLocker is enabled. It may have been activated inadvertently.

As you may be aware, I purchased a Windows 11 home laptop as a testbed computer. I installed it with the no@thankyou.com trick to get a local user and set it up without a password. BitLocker was not enabled. Then I let someone borrow the machine — who logged in using their Microsoft account. That was enough to trigger drive encryption, with the side effect that their BitLocker key was stored in their Microsoft account. Logging in to check their email on the Web would not trigger encryption, but if they logged in to the Microsoft store or added another Microsoft–account-based user, that would do it.

This is a rare occurrence, to be sure. It does happen when a consultant or technician may need apps or tools from the Microsoft store and uses their credentials to get them. Then, after the fact, the owner of the PC may be asked for the BitLocker keys during an update process, all the while insisting that they never enabled BitLocker.

That’s why I always urge you to explicitly disable device encryption on a Windows 11 PC — unless you do it deliberately and have made a permanent record of the keys or know they are stored in your Microsoft account.

Patching recommendations for businesses

Businesses must review how large the WinRE partition is for the PCs in their firm. Many admins are now recommending 1GB for the recovery partition, as a way of future proofing against update problems. So you’ll need to inventory your PCs to find any that have this problem. Then those PCs must go through the partition-resizing process so that updates will proceed without error.

The easiest detection method may be to attempt to install the update and let it fail. But here’s the head-scratcher: This update is pushed only on Windows update, not on WSUS or in the Microsoft catalog site. In short, it’s not IT-friendly, either. I can’t fathom the reason Microsoft would release this update to the very users with the least resources for dealing with it — consumers and very small businesses.

If you do plan to roll out this update, remember that for Windows 10, the WinRE fix is separate, whereas in Windows 11 it is included in the cumulative update. While I’ve not seen issues with Windows 11, I have seen issues with Windows 10. For IT pros, I can recommend a PowerShell script named WinRE-Customization by Martin Himken to assist you in rolling it out.

Patching recommendations for Apple users

You may think that Apple is without its patching trials and tribulations. You would be wrong. I’ve been following two issues without resolution. First, some Mac users are being pushed to the Sonoma release before they want to install it. Even users in our forums have been complaining about this unwanted push. You can restore back, but not without time and energy.

Second, you may have an iPhone that is not giving you the normal texting tone. It’s unclear whether the recent upgrades to iOS 17 are triggering this or whether 17.2.1 will fix the issue. Some have reported turning Bluetooth off or disabling iMessage so that texting will be over SMS. Needless to say, this is frustrating for Apple users. Any time you have an issue with your phone, try to recall whether updates were recently installed. If so, turn your phone off and then on again. Then check the Apple discussions forum, looking for recent complaints. It may not fix your issues, but at least you will know you are not alone.

Resources

MS-DEFCON 1

Talk Bubbles Join the conversation! Your questions, comments, and feedback
about this topic are always welcome in our forums!

Susan Bradley is the publisher of the AskWoody newsletters.


ADVERTISEMENT


Here are the other stories in this week’s Plus Newsletter

PUBLIC DEFENDER

Brian Livingston

Microsoft is pushing Copilot AI out to you

By Brian Livingston

The Microsoft Corporation is moving swiftly to make its Copilot artificial-intelligence software an integral part of Windows and the company’s Microsoft 365 suite of office applications.

Redmond reportedly even plans to build Copilot into the Notepad text editor (perhaps for all those readme.txt files you can’t compose by yourself).

LEGAL BRIEF

Max Stul Oppenheimver

The hidden cost of WFH

By Max Stul Oppenheimer, Esq.

Working from home — or anywhere other than the employer’s official office space — certainly has advantages, especially if the employer provides things that make the job easy, such as a laptop, an Internet connection, and software.

Remote work, however, is not without its downsides. For example, you should check your homeowner’s insurance policy to be sure that your work from home doesn’t adversely affect coverage.

A less obvious potential downside is employer-provided or employer-mandated software.

COMMENTARY

Will Fastie

Bing Chat is sorry

By Will Fastie

I thought it had no emotions.

It took only one sentence for Bing Chat to annoy me.

More importantly, that one sentence was so loaded that it begs for comment. And it raises serious questions about AI.


Know anyone who would benefit from this information? Please share!
Forward the email and encourage them to sign up via the online form — our public newsletter is free!


Enjoying the newsletter?

Become a PLUS member and get it all!

RoboForm box

Don’t miss any of our great content about Windows, Microsoft, Office, 365, PCs, hardware, software, privacy, security, safety, useful and safe freeware, important news, analysis, and Susan Bradley’s popular and sought-after patch advice.

PLUS, these exclusive benefits:

  • Every article, delivered to your inbox
  • Four bonus issues per year, with original content
  • MS-DEFCON Alerts, delivered to your inbox
  • MS-DEFCON Alerts available via TEXT message
  • Special Plus Alerts, delivered to your inbox
  • Access to the complete archive of nearly two decades of newsletters
  • Identification as a Plus member in our popular forums
  • No ads

We’re supported by donations — choose any amount of $6 or more for a one-year membership.

Join Today buttonGift Certificate button

The AskWoody Newsletters are published by AskWoody Tech LLC, Fresno, CA USA.

Your subscription:

Microsoft and Windows are registered trademarks of Microsoft Corporation. AskWoody, AskWoody.com, Windows Secrets Newsletter, WindowsSecrets.com, WinFind, Windows Gizmos, Security Baseline, Perimeter Scan, Wacky Web Week, the Windows Secrets Logo Design (W, S or road, and Star), and the slogan Everything Microsoft Forgot to Mention all are trademarks and service marks of AskWoody Tech LLC. All other marks are the trademarks or service marks of their respective owners.

Copyright ©2024 AskWoody Tech LLC. All rights reserved.