Zero-Day Exploit Bypasses Windows 11 BitLocker in Seconds

Key Takeaways

- YellowKey exploit bypasses default BitLocker protection on Windows 11 with physical access
- Attack uses a custom FsTx folder on a USB drive to skip the BitLocker recovery key requirement
- Security researchers Kevin Beaumont and Will Dormann have independently confirmed the exploit works
What Is the YellowKey Exploit?
A zero-day exploit published this week allows anyone with physical access to a Windows 11 system to bypass BitLocker encryption and read, copy, modify, or delete all drive contents. The attack takes seconds to execute.
The exploit, named YellowKey, was released by a researcher using the alias Nightmare-Eclipse. It defeats the default Windows 11 deployment of BitLocker. That's the full-volume encryption Microsoft provides to protect disk contents from anyone without the decryption key, which is stored in the system's trusted platform module (TPM).
BitLocker is mandatory for many organizations, including government contractors. This exploit puts those protections at risk for any device an attacker can physically reach.
How the Attack Works
The attack is straightforward. An attacker copies a custom FsTx folder from the Nightmare-Eclipse exploit page to a USB drive formatted as NTFS or FAT. They then connect the USB to the target device, boot it up, and immediately hold down the Ctrl key. This takes them to Windows Recovery.
There's an alternate path: boot into Windows, hold Shift, click the power icon, and click restart. Or just power on the device and force a restart as Windows begins loading. Either way, the attacker lands at a command prompt.
In a normal Windows Recovery flow, the system would demand a BitLocker recovery key before granting access to the encrypted drive. YellowKey skips this safeguard entirely. The command prompt has full access to all drive contents.

What Causes the Bypass?
The technical mechanism remains partially unclear. The exploit centers on a custom FsTx folder. Online documentation for this folder is sparse, but it appears to involve what Microsoft calls Transactional NTFS. This feature lets developers achieve "transactional atomicity" for file operations across single or multiple files.
Security researcher Will Dormann noted that Transactional NTFS uses a command-log file system under the hood. He pointed out that Windows' fstx.dll contains code that explicitly looks for \System Volume Information\FsTx in a function called FsTxFindSessions().
The custom FsTx directory used in YellowKey shows file paths including \??\C:\Windows\win.ini and \??\X:\Windows\System32\winpeshl.ini. According to Dormann, X:\Windows\System32\winpeshl.ini controls what Windows Recovery Environment (WinRE) does when it starts. This appears to be the hook that lets the exploit skip the recovery key check.
Independent Confirmation
Multiple security researchers have verified that YellowKey works as described. Kevin Beaumont and Will Dormann both confirmed the exploit independently. Their validation means this is not a theoretical vulnerability or a hoax. It's a working attack.
Microsoft has not yet issued a patch or public statement about YellowKey. Organizations relying on default BitLocker configurations should treat this as an active threat for any device that could be physically accessed by an attacker.
Who Is at Risk?
The exploit requires physical access. Remote attackers cannot use it. But the threat model for many organizations includes device theft, malicious insiders, or "evil maid" attacks where an adversary briefly accesses an unattended laptop.
Government contractors, financial institutions, healthcare organizations, and any company handling sensitive data on laptops should be concerned. BitLocker's entire purpose is to protect data if a device is lost or stolen. YellowKey defeats that protection on default configurations.
Logicity's Take
What Can Organizations Do Now?
While waiting for a Microsoft patch, organizations have limited options. Strict physical security is the most direct mitigation. Do not leave BitLocker-protected devices unattended in public spaces or accessible offices.
Some security teams may want to explore non-default BitLocker configurations. Using a PIN or startup key in addition to TPM-only protection could change the attack surface. However, these configurations introduce usability tradeoffs and may not be feasible for all deployments.
Watch for Microsoft security advisories. When a patch arrives, prioritize deployment. This exploit is public and trivial to replicate.
Frequently Asked Questions
Does the YellowKey exploit work remotely?
No. The attacker must have physical access to the Windows 11 device to execute the exploit.
Which versions of Windows are affected?
The exploit targets default Windows 11 deployments of BitLocker. Other versions have not been confirmed affected.
Has Microsoft released a patch for YellowKey?
Not yet. As of publication, Microsoft has not issued a patch or public statement about this vulnerability.
Can additional BitLocker settings prevent this attack?
Possibly. Using a PIN or startup key alongside TPM may change the attack surface, but this has not been confirmed as a mitigation.
Who discovered the YellowKey exploit?
A security researcher using the alias Nightmare-Eclipse published the exploit earlier this week.
Need Help Implementing This?
Source: Ars Technica
Huma Shazia
Senior AI & Tech Writer
Related Articles
Browse all
Robotaxi Companies Are Hiding How Often Humans Take the Wheel
Autonomous vehicle firms like Waymo and Tesla are under scrutiny for refusing to disclose how often remote operators step in to control their self-driving cars. A Senate investigation reveals major gaps in transparency, raising safety and accountability concerns.

Wisconsin Governor Throws a Wrench in Age Verification Plans
Wisconsin Governor Tony Evers has vetoed a bill that would have required residents to verify their age before accessing adult content online, citing concerns over privacy and data security. This move comes as several other states have already implemented similar age check requirements. The veto has significant implications for the future of online age verification.

Apple's App Store Empire Under Siege: The Battle for the Future of Tech
The long-running feud between Apple and Epic Games has reached a boiling point, with Apple preparing to take its case to the Supreme Court. The tech giant is fighting to maintain control over its App Store, while Epic Games is pushing for more freedom for developers. The outcome could have far-reaching implications for the entire tech industry.

Tesla's Remote Parking Feature: The Investigation That Didn't Quite Park Itself
The US auto safety regulators have closed their investigation into Tesla's remote parking feature, but what does this mean for the future of autonomous driving? We dive into the details of the investigation and what it reveals about the technology. The National Highway Traffic Safety Administration found that crashes were rare and minor, but the investigation's closure doesn't necessarily mean the feature is completely safe.
Also Read

Cisco SD-WAN Zero-Day Exploited: CISA Orders Patch by May 17
Cisco disclosed a critical authentication bypass flaw in its Catalyst SD-WAN Controller that attackers have been exploiting in the wild. The vulnerability allows attackers to gain administrative privileges and manipulate network configurations. CISA has added it to the Known Exploited Vulnerabilities catalog with a three-day patch deadline.

5 New Shows to Stream This Weekend on Netflix, Paramount+
This weekend brings a Heat-inspired crime thriller to Netflix, the second season of Rivals on Hulu, and new content from Taylor Sheridan's Yellowstone universe. Here's what's worth your streaming time from May 15-17.

VW ID.Buzz Returns for 2027 with Camping-Ready Tourer Trim
Volkswagen has confirmed the ID.Buzz electric van is back for model year 2027 after skipping 2026. The lineup adds two new all-wheel-drive trims, including a Tourer model with a fold-out bed, removable blinds, and overnight camping features.