A BitLocker zero-day exploit called YellowKey has exposed a critical vulnerability in Microsoft’s encryption system, allowing attackers to unlock BitLocker-protected drives using nothing more than files copied to a USB stick. Discovered by researcher Eclipse, the BitLocker zero-day exploit challenges Microsoft’s long-standing claims that its full-disk encryption has no backdoors or master keys.
Key Takeaways
- YellowKey exploit unlocks BitLocker drives by rebooting into Windows Recovery Environment with a USB stick
- Exploit files self-delete after use, mimicking backdoor behavior and covering tracks
- Works even with TPM and PIN enabled; Eclipse claims an unpublished variant exists for this configuration
- GreenPlasma, a related exploit, escalates privileges to SYSTEM level by manipulating memory access controls
- Microsoft states BitLocker has no backdoors; the exploit may represent an undocumented WinRE feature or critical bug
How the YellowKey BitLocker Zero-Day Exploit Works
The BitLocker zero-day exploit operates through a deceptively simple attack chain. An attacker copies specific exploit files to a USB stick, inserts it into a target Windows 11 machine, and reboots the system into Windows Recovery Environment (WinRE). Once in WinRE, the exploit triggers automatically, unlocking the BitLocker-protected drive without requiring recovery keys or credentials. The files then vanish from the USB stick after a single use, leaving minimal forensic evidence. This self-deletion behavior is what makes the BitLocker zero-day exploit resemble a deliberate backdoor rather than a simple bug.
The attack requires physical access to the machine, but that is a lower barrier than most assume. A stolen laptop, a device left unattended at an airport, or a borrowed computer all become vulnerable once an attacker has a USB stick with the exploit files. Tom’s Hardware confirmed the BitLocker zero-day exploit works reliably on tested systems, validating researcher Eclipse’s claims.
TPM and PIN Do Not Stop This BitLocker Zero-Day Exploit
One of the most alarming aspects of the BitLocker zero-day exploit is that it bypasses BitLocker’s most robust security configuration. Even systems configured with both TPM (Trusted Platform Module) and a PIN code remain vulnerable to the initial YellowKey variant. Eclipse claims to possess an unpublished variant that defeats this hardened setup but has chosen not to release a proof-of-concept for it. This decision suggests the vulnerability runs deeper than a simple oversight—it indicates a fundamental architectural weakness in how BitLocker validates access during the WinRE boot phase.
For organizations relying on BitLocker as their primary encryption defense, this discovery undermines a core assumption: that TPM plus PIN creates sufficient protection. The BitLocker zero-day exploit proves that assumption wrong, at least for the WinRE attack surface.
GreenPlasma: Privilege Escalation Through Memory Manipulation
Eclipse released a second exploit alongside YellowKey, called GreenPlasma, which performs local privilege escalation to SYSTEM-level access. GreenPlasma manipulates the CTFMon process and crafts a malicious shared memory section object within the Windows Object Manager, bypassing access controls to read unauthorized memory regions. This escalation is particularly dangerous on servers, where SYSTEM-level access grants control over the entire machine and potentially the network it serves.
Unlike YellowKey, GreenPlasma lacks a full public proof-of-concept, making its reliability harder to assess. However, Eclipse’s track record suggests the exploit is functional. The combination of YellowKey and GreenPlasma creates a two-stage attack: unlock the drive, then escalate privileges for complete system compromise.
Microsoft’s Response and the Backdoor Question
Microsoft’s official documentation states that BitLocker contains no backdoors or master keys—recovery requires user-held credentials. The company has not publicly acknowledged the BitLocker zero-day exploit or provided a patch timeline. This silence is telling. If the vulnerability is truly a backdoor, it suggests intentional design. If it is a bug, the lack of urgency in addressing it raises questions about Microsoft’s security prioritization.
Eclipse, for their part, frames the BitLocker zero-day exploit as evidence of a deliberate backdoor. In statements to Tom’s Hardware, Eclipse claimed they could have sold the exploit for substantial money but chose to release it publicly to target Microsoft. Whether this is a backdoor or an undocumented feature that acts like one remains contested, but the functional impact is identical: BitLocker is not the impenetrable encryption users believed it to be.
Comparing BitLocker to Alternatives
The BitLocker zero-day exploit has renewed interest in alternative encryption solutions. VeraCrypt, discussed in privacy-focused communities, offers full-disk encryption without relying on cloud-based key backups, eliminating one attack vector entirely. However, VeraCrypt does not address the physical-access threat that YellowKey exploits.
Microsoft’s Device Encryption, which automatically enables on Windows 11, defaults to storing encryption keys with Microsoft accounts. This design choice has drawn criticism because it enables law enforcement to access encrypted drives via court order—a feature, not a bug, from Microsoft’s perspective, but a privacy concern for users. The BitLocker zero-day exploit adds another layer of concern: even if users trust Microsoft with their keys, the encryption itself may not be secure.
What This Means for Windows 11 Users
For most users, the BitLocker zero-day exploit requires physical access to a device, which limits its real-world impact. However, for high-value targets—journalists, activists, corporate executives—physical security is a constant concern. The exploit also poses significant risk to organizations: a stolen laptop with BitLocker enabled is no longer reliably protected, which changes threat modeling for enterprises that depend on encryption to safeguard sensitive data.
The BitLocker zero-day exploit also raises questions about the security of Windows Recovery Environment itself. WinRE is designed to be accessible without authentication, which makes sense for legitimate recovery scenarios. But this same accessibility becomes a liability when exploit files can trigger privileged operations from within WinRE. Microsoft may need to redesign how WinRE validates and executes recovery operations to close this attack surface.
Does the BitLocker zero-day exploit affect all Windows 11 systems?
Yes, the BitLocker zero-day exploit affects all current BitLocker implementations in Windows 11. Any system with BitLocker enabled and physical access vulnerability is at risk, regardless of whether TPM and PIN are configured. As of the time of this writing, no patch has been released.
Can BitLocker be disabled to prevent this attack?
Disabling BitLocker entirely eliminates the exploit risk but removes encryption protection entirely, which is not a practical solution for most users. The better approach is to assume physical access is a threat and implement additional security measures, such as full-disk encryption alternatives or hardware-based security tokens.
Is Microsoft’s claim that BitLocker has no backdoors still credible?
The BitLocker zero-day exploit has severely damaged that credibility. Whether the vulnerability is a deliberate backdoor or a critical bug, the functional outcome is the same: BitLocker can be bypassed without user credentials. Microsoft’s silence on the issue and lack of a patch timeline only deepen skepticism about the company’s transparency regarding encryption security.
The BitLocker zero-day exploit represents a watershed moment for Windows security. Users who believed their encrypted drives were secure have learned a hard lesson: encryption is only as strong as the system that implements it. For Microsoft, the challenge now is not just fixing the immediate vulnerability, but rebuilding trust in BitLocker’s fundamental security model.
Edited by the All Things Geek team.
Source: TechRadar


