Posted in

Windows Zero-Day Crisis: New Exploit Bypasses BitLocker Encryption in Minutes

On May 14, 2026, the Windows security ecosystem was thrown into chaos. Following a dispute with Microsoft over bug disclosures, a researcher released two devastating zero-day exploits: YellowKey and GreenPlasma.

These aren’t just theoretical risks. The release includes functional code that can bypass BitLocker full-disk encryption and escalate user privileges to the highest level. Because these flaws are currently unpatched, millions of enterprise and government devices running Windows 11 and Windows Server are at immediate risk of physical data theft.


YellowKey: The BitLocker Bypass

The most alarming of the two, YellowKey, targets the Windows Recovery Environment (WinRE). It allows an attacker with physical access to bypass encryption and access a locked drive in just minutes.

  • How it Works: The exploit leverages a vulnerability in how WinRE handles specific folder structures. An attacker simply copies a folder named FsTx to a USB drive or the system’s EFI partition.
  • The Result: Upon rebooting into recovery mode, the system spawns a command shell with unrestricted access to the supposedly “protected” files.
  • Affected Systems: Windows 11, Windows Server 2022, and Windows Server 2025. (Windows 10 is currently unaffected).

GreenPlasma: Escalating to “SYSTEM” Power

While YellowKey breaks the lock on the door, GreenPlasma hands the attacker the keys to the entire house. This local privilege escalation (LPE) flaw targets the Windows CTFMON service.

By creating unauthorized memory sections in restricted directories, an unprivileged user can trick the operating system into executing commands with SYSTEM-level authority. When combined with other attacks, this allows for total, persistent control over the OS kernel and all installed drivers.


Vulnerability Summary Table

Threat ComponentVulnerability TypeAffected SystemsKey Artifacts
YellowKeyEncryption BypassWin 11, Server 22/25\FsTx directory
GreenPlasmaPrivilege EscalationWin 11, Server 22/25CTFMON memory sections

Immediate Defensive Mitigations

Microsoft has not yet released a patch for these zero-days. Until an official fix is available, security experts recommend the following “hardening” steps to reduce the success rate of the current public exploits:

  1. Require a BitLocker PIN: While the researcher claims the vulnerability can bypass PINs, the current public version of the exploit is significantly hindered if a pre-boot PIN is required.
  2. Set a BIOS/UEFI Password: Prevent unauthorized users from changing the boot order or accessing the USB ports during the startup phase.
  3. Physical Security: Since YellowKey requires physical access or a reboot into WinRE, restrict physical access to sensitive hardware and monitor for unauthorized USB insertions.
  4. Monitor WinRE: Use endpoint security tools to alert on any modifications to the Windows Recovery Environment or the EFI partition.

Conclusion: The Danger of the “Backdoor” Claim

The researcher behind the leak has made the explosive claim that these flaws are “intentionally placed backdoors.” While this remains unverified, the reality is that the code is now public and usable by threat actors globally. Organizations must treat physical device security as a tier-one priority until Microsoft issues an official resolution.

Leave a Reply

Your email address will not be published. Required fields are marked *