KB5011495 CU Windows 10 1607 Build 14393.5006

Windows 10 1607 receives a new cumulative update this Tuesday i.e. 8th March 2022 titled “KB5011495”. This is basically a security patch upgrading the existing OS Build to 14393.5006.

Editor Tip: RESTORO is a great software that can automatically find and resolve update, activation, or driver issues on your Windows 11/10 PC. Having this tool ensures that you can use your device to its fullest capacity.

Download: RESTORO PC Repair Tool

Apart from securing your whole operating system, this update brings several key fixes and improvements to Memory leaks and Remote desktops. Let’s explore the key features that came along with this update in detail –

Windows 10 Cumulative update - KB5011495

KB5011495 Changelog

The key changes on this OS Build 14393.5006 are as follows –

  • Improves the security of the entire operating system.
  • Resolves printing issues while using some low integrity process apps.
  • Addresses an anomaly that causes Windows to enter the BitLocker recovery after a servicing update.
  • Works upon an issue that causes the DnsServerPsProvider module to leak memory inside a WmiPrvSE.exe process. This patch also resolves a memory leak inside the wmipicmp.dll module. This was known to trigger a lot of false alarms in the System Center Operations Manager (SCOM) data center monitoring system.
  • Works upon an issue that appears when you attempt to write a service principal name (SPN) alias (such as www/Contoso) and HOST/NAME already exists on another object.
    • You will receive an Access denied error if the RIGHT_DS_WRITE_PROPERTY is on the SPN attribute of the colliding object.

Remote Desktop Improvements

  • No mismatching issue between a Remote Desktop session’s keyboard and the Remote Desktop Protocol (RDP) client when signing in.
  • Resolves an issue by checking if CSharedLock in the Remote Procedure Call Server Service (RPCSS) was acquired recursively and only sets exclusive_owner to 0 when the recursive count is 0.

Known Issues on KB5011495 

By far, we know about the following issues that might occur after you upgrade your Windows 10 1607 to OS Build 14393.5006. They are –

  • Error 0xc0000005: After installing the 11th Jan 2022 cumulative update, applications that use the Microsoft .NET Framework to acquire or set Active Directory Forest Trust Information might get into some issues. Owing to this issue, an access violation (0xc0000005) error might occur.

As a workaround, you may download and install the latest .NET Framework on your computer. You may find the relevant links in the release note provided below.

How to Get this Update on Windows 10 1607

As usual, you may upgrade your operating system to OS Build 14393.5006 by following either channel –

Note: Make sure to download and upgrade to the recent servicing stack update on your computer. This ensures the update process completes without getting into bugs or issues. The recent SSU for Windows 10 1607 is KB5011570.

  1. Windows Update: Launch Settings (Win + I), select Windows Update, and hit Check for updates. The system will search for any pending updates and download/install them (if it finds any). Once the installation completes, restart your PC to enjoy the latest security features on your computer.
  2. Update Catalog: If you had disabled the automatic update on your computer, you may get the latest standalone package yourself. All you require is to visit Microsoft’s update catalog, pick your system architecture, and hit the Download button. After the installation completes, the system will ask to reboot your PC. Well, do the same.
  3. WSUS: The KB5011495 update will automatically sync with WSUS if you configure Products and Classifications as follows:
    • Product: Windows 10 
    • Classification: Security updates

Release Note

Tip: If you are facing update, activation, or driver issues on your Windows PC, try RESTORO PC Repair Tool.This software will scan your device for potential issues and resolve them automatically.

Leave a Reply

Your email address will not be published.