Two new unpatched Home windows BitLocker zero-day vulnerabilities considerably compromise Microsoft’s ecosystem. The exploits embrace a important BitLocker encryption bypass referred to as YellowKey and a privilege escalation flaw named GreenPlasma.
Essentially the most important of those flaws, dubbed “YellowKey,” allows a complete bypass of BitLocker encryption, granting attackers utterly unrestricted entry to locked system drives.
Following Microsoft’s current Patch Tuesday, a annoyed researcher escalated an ongoing dispute by dropping two extreme zero-day exploits.
The researcher expressed excessive dissatisfaction with Microsoft’s dealing with of earlier disclosures, threatening additional disruption and releasing the code as a direct retaliation. This surprising launch leaves thousands and thousands of enterprise and authorities units weak.
He additional claims these vulnerabilities are deliberately positioned backdoors, actively crediting inner Microsoft risk teams like MSTIC and GHOST in a extremely uncommon public flex.
YellowKey BitLocker Bypass
YellowKey is a critical exploit that enables risk actors with bodily entry to completely bypass BitLocker full-disk encryption in minutes. The vulnerability resides inside the Home windows Restoration Surroundings (WinRE) and solely impacts Home windows 11, Home windows Server 2022, and Home windows Server 2025.
Home windows 10 stays unaffected attributable to structural variations in its restoration structure. Attackers solely want to repeat a particularly named FsTx folder onto a appropriate USB stick and plug it into the goal machine.

Alternatively, attackers can bodily extract the goal drive, copy the exploit recordsdata instantly into the EFI partition, and remount the drive to realize the very same consequence.
By rebooting the system into the restoration agent utilizing particular key mixtures, the exploit leverages WinRE parts to spawn a shell with unrestricted entry to the protected quantity.
GreenPlasma Privilege Escalation
Alongside the encryption bypass, the hacker launched partial proof-of-concept code for GreenPlasma, a severe local privilege escalation vulnerability. This particular flaw exploits the Home windows CTFMON service by means of arbitrary reminiscence part creation.
An unprivileged attacker can create these memory-section objects inside listing constructions which might be usually writable solely by the executive SYSTEM account. Consequently, malicious actors can manipulate trusted Home windows providers and kernel-mode drivers into executing unauthorized instructions.

Whereas the present public code triggers a Consumer Account Management immediate and requires extra weaponization to realize a totally silent assault, it poses a considerable problem for safety defenders.
If absolutely chained with preliminary entry vectors, this might permit persistent, full entry to the core of the working system.
| Risk Part | Vulnerability Sort | Affected Programs | Key Artifacts |
|---|---|---|---|
| YellowKey | Encryption Bypass | Home windows 11, Server 2022/2025 | System Quantity InformationFsTx listing |
| YellowKey | WinRE Exploit | Home windows 11, Server 2022/2025 | bootmgfw.efi manipulation |
| GreenPlasma | Privilege Escalation | Home windows 11, Server 2022/2025 | CTFMON Arbitrary Part Creation |
| GreenPlasma | Reminiscence Manipulation | Home windows 11, Server 2022/2025 | SYSTEM-writable listing objects |
Microsoft has not but issued an official patch for these freshly dropped zero-day exploits. Unbiased safety researchers analyzing the YellowKey risk strongly suggest implementing a customized BitLocker PIN and a strong BIOS password as rapid defensive mitigations.
Whereas Nightmare-Eclipse claims the core vulnerability bypasses TPM and PIN configurations, the general public proof-of-concept at the moment lacks that execution functionality.
Safety groups ought to actively monitor bodily entry to {hardware} endpoints and prohibit unauthorized WinRE modifications till Microsoft formally resolves the scenario.
Observe us on Google News, LinkedIn, and X to Get Extra Prompt Updates.









