Categories: Insur. Cyber

Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit


Ravie LakshmananMay 20, 2026Vulnerability / Encryption

Microsoft on Tuesday released a mitigation for a BitLocker bypass vulnerability named YellowKey following its public disclosure last week.

The zero-day flaw, now tracked as CVE-2026-45585carries a CVSS score of 6.8. It has been described as a BitLocker security feature bypass.

“Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as ‘YellowKey,'” the tech giant said in an advisory. “The proof of concept for this vulnerability has been made public, violating coordinated vulnerability best practices.”

The issue impacts Windows 11 version 26H1 for x64-based Systems, Windows 11 Version 24H2 for x64-based Systems, Windows 11 Version 25H2 for x64-based Systems, Windows Server 2025, and Windows Server 2025 (Server Core installation).

YellowKey was disclosed by a security researcher named Chaotic Eclipse (aka Nightmare-Eclipse). It essentially allows placing specially crafted ‘FsTx’ files on a USB drive or EFI partition, plugging the USB drive into the target Windows computer with BitLocker protections turned on, rebooting into the Windows Recovery Environment (WinRE), and triggering a shell with unrestricted access by holding down the CTRL key.

“If you did everything properly, a shell will spawn with unrestricted access to the BitLocker protected volume,” the researcher noted in a GitHub post.

Redmond noted that successful exploitation could permit an attacker with physical access to sidestep the BitLocker Device Encryption feature on the system storage device and gain access to encrypted data.

To address the risk, the following mitigations have been outlined:

  • Mount the WinRE image on each device.
  • Mount the system registry hive of the mounted WinRE image.
  • Modify BootExecute by removing “autofstx.exe” value from Session Manager’s BootExecute REG_MULTI_SZ value.
  • Save and unload Registry hive.
  • Unmount and commit the updated WinRE image.
  • Reestablish BitLocker trust for WinRE.

“Specifically, you prevent the FsTx Auto Recovery Utility, autofstx.exe, from automatically starting when the WinRE image launches,” security researcher Will Dormann said. “With this change, the Transactional NTFS replaying that deletes winpeshl.ini no longer happens. It also recommends switching from TPM-only to TPM+PIN.”

Microsoft also emphasized that users can be safeguarded against exploitation by configuring BitLocker on already encrypted devices with “TPM-only” protector by switching to “TPM+PIN” mode via PowerShell, the command line, or the control panel. This will require a PIN to decrypt the drive at startup, effectively backing YellowKey attacks.

On devices that are not encrypted, administrators are advised to enable the “Require additional authentication at startup” option via Microsoft Intune or Group Policies and ensure that “Configure TPM startup PIN” is set to “Require startup PIN with TPM.”



Source link
nabeelhassan565@gmail.com

Share
Published by
nabeelhassan565@gmail.com

Recent Posts

WTW sues Howden about alleged yacht team raid

Willis Towers Watson sued Howden US and several former WTW brokers Tuesday, alleging the rival…

1 heure ago

‘Am I out?’ Drought and Rising Costs From Iran War Deepen Pain for US Farmers

Scott Irlbeck crouched in a field of stunted wheat plants in a parched stretch of…

3 heures ago

Workplace homicides steady, concentrated in public-facing jobs: NCCI

Workplace homicides remain relatively rare but persistent, with most occurring in public-facing jobs, cash-handling environments,…

4 heures ago

Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development

Ravie LakshmananMay 20, 2026Artificial Intelligence / Security Testing Microsoft has unveiled two new open-source tools…

4 heures ago

Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks

Microsoft on Tuesday said it disrupted a malware-signing-as-a-service (MSaaS) operation that weaponized the company's Artifact…

4 heures ago

Vienna Insurance nears full control of German firm

Austria-headquartered Vienna Insurance Group AG Wiener Versicherung Gruppe has completed its acquisition of Nürnberger Beteiligungs…

5 heures ago