Source: BleepingComputer
Author: Sergiu Gatlan
URL: https://www.bleepingcomputer.com/news/microsoft/microsoft-shares-mitigation-for-yellowkey-windows-zero-day/
ONE SENTENCE SUMMARY:
Microsoft issued mitigations for YellowKey BitLocker zero-day, detailing registry, WinRE, and TPM+PIN changes to reduce exploitation risk.
MAIN POINTS:
- YellowKey is a Windows BitLocker zero-day enabling access to protected drives.
- Anonymous researcher “Nightmare Eclipse” disclosed it and released a proof-of-concept exploit.
- Exploitation uses crafted FsTx files on USB/EFI, booting into WinRE.
- Holding CTRL reportedly triggers an unrestricted shell against BitLocker-protected volumes.
- Microsoft tracks YellowKey as CVE-2026-45585 and published interim mitigations.
- Guidance includes removing autofstx.exe from Session Manager BootExecute registry value.
- Mitigation requires reestablishing BitLocker trust for WinRE using CVE-2026-33825 procedures.
- Analyst explanation: blocking autofstx.exe stops NTFS replay deleting winpeshl.ini.
- Microsoft recommends switching encrypted devices from TPM-only to TPM+PIN pre-boot authentication.
- For unencrypted devices, enforce additional startup authentication via Intune/Group Policy settings.
TAKEAWAYS:
- Treat WinRE and boot-time paths as critical attack surfaces for BitLocker bypasses.
- Implement registry and WinRE trust hardening immediately while awaiting a security update.
- Enforcing TPM+PIN materially raises the bar against pre-boot local bypass techniques.
- Public PoCs increase likelihood of real-world exploitation, demanding rapid configuration changes.
- Validate security controls beyond pentest “reachability,” including detection and configuration effectiveness.