TL;DR

A security researcher has demonstrated a zero-day exploit, YellowKey, that can open BitLocker-protected drives with just some files on a USB stick. The vulnerability affects Windows Server versions but not Windows 10, prompting security concerns worldwide.

A security researcher has demonstrated a zero-day exploit, named YellowKey, that allows full access to BitLocker-encrypted drives using only files copied onto a USB stick, bypassing encryption protections. This discovery raises urgent security concerns for millions of Windows users, including enterprises and governments, as it exposes a critical vulnerability in widely used data protection technology.

The exploit, disclosed by researcher Chaotic Eclipse, involves copying specific files to a USB device and rebooting into the Windows Recovery Environment. Once initiated, the exploit grants access to the encrypted drive without requiring the encryption key stored in the TPM, effectively bypassing BitLocker’s security. Eclipse confirmed that the exploit works on Windows Server 2022 and 2025, but not on Windows 10, and noted that the malicious files disappear after use, indicating a backdoor mechanism.

Microsoft has not yet issued an official response to the YellowKey vulnerability. The researcher claims the exploit is well-hidden and that using a full TPM-and-PIN setup does not mitigate the risk, suggesting that even more secure configurations are vulnerable. Additionally, Eclipse has disclosed that there are other exploits, such as GreenPlasma, which could grant system-level access through local privilege escalation, although a complete proof-of-concept has not yet been released.

Why It Matters

This development is significant because BitLocker encrypts millions of devices globally, including personal computers, enterprise workstations, and government systems. The ability to bypass encryption with a simple file-based method undermines the trust in BitLocker’s security, especially given the exploit’s stealthy nature. If exploited in the wild, it could lead to unauthorized data access, theft, or manipulation of sensitive information, impacting organizations and individuals alike.

64GB - Bootable USB Drive 3.2 for Windows 11/10 / 8.1/7, Install/Recovery, No TPM Required, Included Network Drives (WiFi & LAN),Supported UEFI and Legacy, Data Recovery, Repair Tool

64GB – Bootable USB Drive 3.2 for Windows 11/10 / 8.1/7, Install/Recovery, No TPM Required, Included Network Drives (WiFi & LAN),Supported UEFI and Legacy, Data Recovery, Repair Tool

✅ Beginner watch video instruction ( image-7 ), tutorial for "how to boot from usb drive", Supported UEFI…

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Background

BitLocker has been a core component of Windows security since its introduction, designed to protect data by encrypting drives and relying on hardware-based keys stored in the TPM. Previous vulnerabilities have been patched over the years, but the recent disclosure by Eclipse marks a new and sophisticated attack vector. The researcher has previously released zero-day exploits targeting Windows Defender, which were reportedly dismissed or silently patched by Microsoft, raising questions about the company’s response to security disclosures.

“This exploit can be triggered by copying some files to a USB stick and rebooting into Windows Recovery, granting full access to the drive. It’s a backdoor, and the files disappear after use.”

— Chaotic Eclipse

“Using a TPM-and-PIN setup does not help; I have a variant for that scenario I haven’t published yet. This vulnerability is well-hidden, and I could have made a lot of money selling it, but I am against Microsoft.”

— Chaotic Eclipse

Amazon

BitLocker encryption recovery software

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What Remains Unclear

Microsoft has not yet issued an official statement regarding YellowKey or GreenPlasma. Details about the full scope of the vulnerability, especially in enterprise and server environments, remain unclear. It is also not confirmed whether patches are in development or if existing security measures can fully mitigate the exploit.

Yubico - Security Key NFC - Basic Compatibility - Multi-factor authentication (MFA) Security Key, Connect via USB-A or NFC, FIDO Certified

Yubico – Security Key NFC – Basic Compatibility – Multi-factor authentication (MFA) Security Key, Connect via USB-A or NFC, FIDO Certified

POWERFUL SECURITY KEY: The Security Key NFC is the essential physical passkey for protecting your digital life from…

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What’s Next

Microsoft is expected to investigate the vulnerability and release security patches for affected Windows Server versions. Security researchers and organizations should monitor official updates and consider temporary mitigations. Further disclosures about GreenPlasma and other potential exploits are anticipated as investigations continue.

64GB - Bootable USB Drive 3.2 for Windows 11/10 / 8.1/7, Install/Recovery, No TPM Required, Included Network Drives (WiFi & LAN),Supported UEFI and Legacy, Data Recovery, Repair Tool

64GB – Bootable USB Drive 3.2 for Windows 11/10 / 8.1/7, Install/Recovery, No TPM Required, Included Network Drives (WiFi & LAN),Supported UEFI and Legacy, Data Recovery, Repair Tool

✅ Beginner watch video instruction ( image-7 ), tutorial for "how to boot from usb drive", Supported UEFI…

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Key Questions

Can this exploit be used against all Windows devices?

No, currently it is confirmed to work on Windows Server 2022 and 2025, but not on Windows 10. Its applicability to other versions remains unconfirmed.

Does this mean BitLocker is no longer secure?

The exploit challenges the assumption that BitLocker is invulnerable when used without additional protections. However, using full TPM-and-PIN configurations may mitigate the risk, though the researcher claims even that setup is vulnerable.

Will Microsoft patch this vulnerability?

Microsoft has not yet issued an official statement. It is expected that patches will be released for affected Windows Server versions, but details are still pending.

What should organizations do now?

Organizations should stay alert for official security updates, consider additional security measures, and monitor for suspicious activity related to drive access and recovery procedures.

You May Also Like

Air Cooling Vs Liquid Cooling: Which Is Better for Your PC?

Air cooling vs liquid cooling: which is better for your PC? Discover the key differences to help you make the right choice.

Japan to broaden subsidies for domestic legacy chip production

Japan will broaden subsidies for domestic legacy semiconductor manufacturing by removing a 30 billion yen investment minimum, supporting smaller firms.

Why High-End GPUs Are Not the Best Upgrade for Everyone

Why invest in a high-end GPU when your current setup might already meet your needs and other components could limit performance gains?

UPS Battery Backup Vs Surge Protector: Does Your PC Need a UPS?

Learn why a UPS battery backup may be essential for your PC beyond just surge protection and discover if you really need one.