Close Menu

    Subscribe to Updates

    Get the latest Tech news from SynapseFlow

    What's Hot

    Microsoft Rolls Out Mitigations for ‘YellowKey’ BitLocker Bypass

    May 21, 2026

    Why Is Mark Zuckerberg Taunting His Employees Before Firing Them?

    May 20, 2026

    A huge 50% drop puts this 65‑inch 4K TV at its best price

    May 20, 2026
    Facebook X (Twitter) Instagram
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    Facebook X (Twitter) Instagram YouTube
    synapseflow.co.uksynapseflow.co.uk
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    synapseflow.co.uksynapseflow.co.uk
    Home»Cybersecurity»Microsoft Rolls Out Mitigations for ‘YellowKey’ BitLocker Bypass
    Microsoft Rolls Out Mitigations for ‘YellowKey’ BitLocker Bypass
    Cybersecurity

    Microsoft Rolls Out Mitigations for ‘YellowKey’ BitLocker Bypass

    The Tech GuyBy The Tech GuyMay 21, 2026No Comments3 Mins Read0 Views
    Share
    Facebook Twitter LinkedIn Pinterest Email
    Advertisement


    Microsoft on Tuesday rolled out mitigations for YellowKey, a recently disclosed zero-day vulnerability leading to BitLocker bypass.

    Advertisement

    The issue, now tracked as CVE-2026-45585 (CVSS score of 6.8), can be triggered by an attacker with physical access to a system by using a USB drive containing the publicly released YellowKey exploit code and rebooting the system into recovery mode.

    Instead of serving the attacker the typical Windows Recovery Environment (WinRE), the exploit spawns a shell, offering access to the underlying partition’s contents, no longer protected by BitLocker’s encryption.

    Microsoft’s advisory acknowledges the public exploit and its effects: “A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.”

    In its advisory, the tech giant guides defenders through a multi-stage process that involves mounting the WinRe image on each device, mounting the system registry hive of the image, removing autofstx.exe from the mounted hive, mounting the updated image, and reestablishing BitLocker trust for WinRe.

    The company also recommends adding a PIN to BitLocker. However, Chaotic Eclipse, the disgruntled researcher who dropped the exploit and several other Windows zero-days, claims that YellowKey also works on systems where TPM (Trusted Platform Module) protection has been supplemented by a PIN.

    Advertisement. Scroll to continue reading.

    The mitigations rolled out by Microsoft, Tharros Labs senior principal vulnerability analyst Will Dormann says, effectively prevent the FsTx Auto Recovery utility (autofstx.exe) from automatically running during the WinRE image’s initiation.

    The underlying vulnerability, Dormann explained last week, involves triggering FsTx from a USB drive when entering Windows Recovery to delete the winpeshl.ini file, which essentially controls WinRE’s behavior.

    The YellowKey exploit contains an FsTx directory that, when placed on a USB drive, relies on Transactional NTFS replay to delete the winpeshl.ini file in the System32 folder, resulting in the attacker being served a command prompt window with BitLocker unlocked, instead of the typical recovery mode.

    “While the TPM-only Bitlocker bypass is indeed interesting, I think the buried lede here is that a \System Volume Information\FsTx directory on one volume has the ability to modify the contents of another volume when it is replayed. To me, this in and of itself sounds like a vulnerability,” Dormann said.

    Related: Researcher Drops MiniPlasma Windows Exploit for Unpatched 2020 CVE

    Related: Microsoft Disrupts Malware-Signing Service Run by ‘Fox Tempest’

    Related: Microsoft Warns of Exchange Server Zero-Day Exploited in the Wild

    Related: Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises

    Advertisement
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    The Tech Guy
    • Website

    Related Posts

    Quantum Bridge Raises $8 Million for Quantum-Safe Key Distribution Solution

    May 20, 2026

    Over 320 NPM Packages Hit by Fresh Mini Shai-Hulud Supply Chain Attack

    May 20, 2026

    Microsoft Disrupts Malware-Signing Service Run by ‘Fox Tempest’ 

    May 20, 2026

    Verizon DBIR 2026: Vulnerability Exploitation Overtakes Credential Theft as Top Breach Vector

    May 20, 2026

    Drupal to Patch Highly Critical Vulnerability at Risk of Quick Exploitation

    May 19, 2026

    B1ack’s Stash Marketplace Gives Away 4.6 Million Stolen Credit Cards

    May 19, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    The iPad Air brand makes no sense – it needs a rethink

    October 12, 202516 Views

    ChatGPT Group Chats are here … but not for everyone (yet)

    November 14, 20258 Views

    Facebook updates its algorithm to give users more control over which videos they see

    October 8, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Advertisement
    About Us
    About Us

    SynapseFlow brings you the latest updates in Technology, AI, and Gadgets from innovations and reviews to future trends. Stay smart, stay updated with the tech world every day!

    Our Picks

    Microsoft Rolls Out Mitigations for ‘YellowKey’ BitLocker Bypass

    May 21, 2026

    Why Is Mark Zuckerberg Taunting His Employees Before Firing Them?

    May 20, 2026

    A huge 50% drop puts this 65‑inch 4K TV at its best price

    May 20, 2026
    categories
    • AI News & Updates
    • Cybersecurity
    • Future Tech
    • Reviews
    • Software & Apps
    • Tech Gadgets
    Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 SynapseFlow All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.