Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation
Briefly

Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation
"YellowKey affects Windows 11 and Windows Server 2022/2025. At a high level, it involves copying specially crafted "FsTx" files on a USB drive or the EFI partition, plugging the USB drive into the target Windows computer with BitLocker protections turned on, rebooting into WinRE, and triggering a shell by holding down the CTRL key."
"YellowKey as "one of the most insane discoveries I ever found," likening the BitLocker bypass to functioning as a backdoor, as the bug is present only in the Windows Recovery Environment ( WinRE), a built-in framework designed to troubleshoot and repair common unbootable operating system issues."
""I think it will take a while even for MSRC to find the real root cause of the issue. I just never managed to understand why this vulnerability is sooo well hidden," the researcher explained. "Second thing is, no, TPM+PIN does not help, the issue is still exploitable regardless.""
""I was able to reproduce [YellowKey] with a USB drive attached," adding, "it looks like Transactional NTFS bits on a USB Drive are able to delete the winpeshl.ini file on ANOTHER DRIVE (X:). And we get a cmd.exe prompt, with BitLocker unlocked instead of the expected Windows Recovery environment.""
Two additional Windows zero-days were disclosed, including a BitLocker bypass and a privilege escalation affecting the Windows Collaborative Translation Framework (CTFMON). The BitLocker bypass, YellowKey, exists only in the Windows Recovery Environment and affects Windows 11 and Windows Server 2022/2025. The process involves copying specially crafted FsTx files onto a USB drive or the EFI partition, booting the target with BitLocker enabled into WinRE, and triggering a shell by holding the CTRL key. TPM+PIN does not prevent exploitation. A separate vulnerability, GreenPlasma, enables privilege escalation through CTFMON. Reproduction reports indicate Transactional NTFS behavior on a USB drive can delete winpeshl.ini on another drive and yield a cmd.exe prompt with BitLocker unlocked.
Read at The Hacker News
Unable to calculate read time
[
|
]