Microsoft has published a mitigation for a BitLocker security omission vulnerability known as YellowKey (CVE-2026-45585) after his concept test was publicly leaked and the coordinated disclosure process was broken. The failure, with a CVSS score of 6.8, allows an attacker with physical access to use specially manipulated files ("FsTx") in a USB drive or in the EFI partition, to restart the machine in the Windows Recovery Environment (WinRE) and to cause the execution of a utility that, according to the researcher, opens a shell with unrestricted access to the volume encrypted by BitLocker.
It is important to stress that This attack requires physical access and the ability to force WinRE boot from external means, which partially limits the threat radius to equipment theft scenarios, access to server rooms or environments with laxity boot policies. However, the existence of a public PoC increases the operational risk: adversaries with technical knowledge and physical access can automate commitment tests without the need to investigate vulnerability from scratch. For additional technical coverage and journalistic monitoring, covers such as BleepingComputer have documented the disclosure and response of Microsoft: BleepingComputer on YellowKey.

Microsoft has described a modification-based mitigation of the WinRE: you have to mount the WinRE image, load your registration fig, remove the "autofstx.exe" input of the Session Manager BootExecute value, save and download the fig, and recompromise the image on the device. This prevents the FsTx utility from running automatically when WinRE starts. In addition, the company recommends to change the BitLocker protectors from TPM-only to TPM + PIN, so that the volume unlocking requires a PIN in the boot and does not depend only on the TPM module. The official documentation of BitLocker in Microsoft can help plan these changes: BitLocker documentation in Microsoft Docs.
For teams and managers, the practical implications are twofold: first, mitigation in WinRE images must be applied and widely deployed; second, start-up policies and physical security must be reviewed. Switching to TPM + PIN drastically reduces the effectiveness of YellowKey because even with WinRE committed the attacker will not be able to decipher the unit without knowing the PIN. Microsoft describes options to impose this requirement from Intune or Group Policies ("Require additional authentication at startup" and "Configure TPM startup PIN").

It is not enough just to mitigate at the software level: strengthen physical and firmware control It's crucial. I recommend disabling the boot from USB when it is not necessary, protecting UEFI / BIOS firmware with password, forcing Secure Boot and registering who has physical access to critical machines. These measures reduce the opportunities for an attacker to insert manipulated means or restart servers to invoke WinRE with external means.
At the operational level, organizations should prioritize the identification and mapping of WinRE images used by the fleet, integrate checks into the image management cycle and automate the modification proposed by Microsoft to prevent human errors. It is also appropriate to review incident response procedures: to confirm the integrity of winpeshl.ini and to look for signs that unauthorized profits have been executed in WinRE. For practical BitLocker management guides and tools such as manage-bde and PowerShell, Microsoft documentation offers commands and examples to change protectors and deploy safe start policies.
Finally, balancing security and operational is fundamental. TPM + PIN introduces friction(PIN recovery, user support), so you have to prepare support and recovery processes (key rotation, secure storage of recovery information). Technical mitigation should be accompanied by staff awareness, physical controls and regular reviews of recovery images to quickly close similar vectors in the future.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...