CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

BitLocker bypass technique YellowKey leveraging FsTx files disclosed with mitigation available

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A bypass technique dubbed YellowKey for Microsoft BitLocker Device Encryption was publicly disclosed, enabling attackers with physical access to bypass encryption on certain Windows systems. The technique abuses a Windows Recovery Environment (WinRE) behavior via specially crafted FsTx files on USB or EFI partitions, allowing unauthenticated shell access when triggering WinRE with the CTRL key. Microsoft issued mitigations and recommends switching from TPM-only to TPM+PIN protectors to neutralize the bypass.

Timeline

  1. 20.05.2026 11:28 1 articles · 10h ago

    Mitigation for YellowKey BitLocker bypass technique released with TPM+PIN recommendation

    Microsoft released mitigations for the YellowKey BitLocker bypass technique (CVE-2026-45585) impacting Windows 11 24H2/25H2/26H1 and Windows Server 2025. The mitigation disables autofstx.exe in BootExecute within WinRE to prevent the FsTx Auto Recovery Utility from executing, and Microsoft advises switching from TPM-only to TPM+PIN protectors. The bypass allows attackers with physical access to gain unauthenticated shell access and access encrypted data by inserting a USB drive with an FsTx file and triggering WinRE with the CTRL key.

    Show sources

Information Snippets