[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fYULeuMMtNUFOhRXigLNB-0KhDLZHSr0v5RuVi01Y2Kk":3},{"article":4,"iocs":47},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":31,"category":32,"article_tags":36},"85b135f4-2343-4a0c-8d98-48bcc2e07203","Microsoft shares mitigation for YellowKey Windows zero-day","microsoft-shares-mitigation-for-yellowkey-windows-zero-day-de9688","Microsoft has shared mitigations for YellowKey, a recently disclosed Windows BitLocker zero-day vulnerability that grants access to protected drives. [...]","Microsoft has published mitigations for YellowKey (CVE-2026-45585), a Windows BitLocker zero-day vulnerability that allows attackers to access protected drives by placing specially crafted FsTx files on USB or EFI partitions and rebooting into WinRE. The flaw was disclosed by anonymous researcher Nightmare Eclipse, who also leaked multiple other zero-day vulnerabilities (BlueHammer, RedSun, GreenPlasma, and UnDefend) in protest of Microsoft's vulnerability disclosure handling. Microsoft recommends removing autofstx.exe from Session Manager boot execution and configuring BitLocker to TPM+PIN mode as interim protections.","Microsoft releases mitigation for YellowKey BitLocker zero-day disclosed by Nightmare Eclipse.","Microsoft shares mitigation for YellowKey Windows zero-day By Sergiu Gatlan May 20, 2026 03:31 AM 1 Microsoft has shared mitigations for YellowKey, a recently disclosed Windows BitLocker zero-day vulnerability that grants access to protected drives. The security flaw was disclosed last week by an anonymous security researcher known as 'Nightmare Eclipse,' who described it as a backdoor and published a proof-of-concept (PoC) exploit. Nightmare Eclipse said that exploiting this zero-day involves placing specially crafted 'FsTx' files on a USB drive or EFI partition, rebooting into WinRE, and then triggering a shell with unrestricted access to the BitLocker-protected storage volume by holding down the CTRL key. Last month, they also disclosed the BlueHammer (CVE-2026-33825) and RedSun (no identifier) local privilege escalation (LPE) zero-day flaws, both of which are now being exploited in attacks. The researcher also leaked GreenPlasma, a zero-day privilege-escalation security issue that attackers can abuse to obtain a SYSTEM shell, and UnDefend, another zero-day that attackers with standard user permissions can exploit to block Microsoft Defender definition updates. While the exact circumstances that triggered this spree of exploit leaks are still unclear, Nightmare Eclipse previously said that these disclosures are in protest of how Microsoft's Security Response Center (MSRC) handled the disclosure process for other security flaws they reported in the past. Microsoft shares YellowKey mitigations On Tuesday, Microsoft said it is now tracking the YellowKey flaw under CVE-2026-45585 and shared mitigation measures to defend against potential attacks exploiting it in the wild. \"Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as \"YellowKey\". The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices,\" Microsoft said in a Tuesday advisory. \"We are issuing this CVE to provide mitigation guidance that can be implemented to protect against this vulnerability until the security update is made available.\" To mitigate YellowKey attacks, Microsoft recommended removing the autofstx.exe entry from the Session Manager's BootExecute REG_MULTI_SZ value, then reestablishing BitLocker trust for WinRE by following the procedure detailed under \"Mitigations\" in the CVE-2026-33825 advisory. \"Specifically, you prevent the FsTx Auto Recovery Utility, autofstx.exe, from automatically starting when the WinRE image launches,\" Will Dormann, principal vulnerability analyst at Tharros, explained. \"With this change, the Transactional NTFS replaying that deletes winpeshl.ini no longer happens.\" Microsoft also advised customers to configure BitLocker on already encrypted devices from \"TPM-only\" mode to \"TPM+PIN\" mode via PowerShell, the command line, or the control panel, which will require a pre-boot PIN to decrypt the drive at startup and should block YellowKey attacks. On devices that are not yet encrypted, admins can enable the \"Require additional authentication at startup\" option via Microsoft Intune or Group Policies, while ensuring that \"Configure TPM startup PIN\" is set to \"Require startup PIN with TPM.\" The Validation Gap: Automated Pentesting Answers One Question. You Need Six. Automated pentesting tools deliver real value, but they were built to answer one question: can an attacker move through the network? They were not built to test whether your controls block threats, your detection rules fire, or your cloud configs hold.This guide covers the 6 surfaces you actually need to validate. Download Now Related Articles: Recently leaked Windows zero-days now exploited in attacksMicrosoft: April updates trigger BitLocker key prompts on some serversMicrosoft fixes BitLocker recovery issue only for Windows 11 usersMicrosoft confirms April Windows updates cause backup failuresWindows BitLocker zero-day gives access to protected drives, PoC released","https:\u002F\u002Fwww.bleepingcomputer.com\u002Fnews\u002Fmicrosoft\u002Fmicrosoft-shares-mitigation-for-yellowkey-windows-zero-day\u002F","https:\u002F\u002Fwww.bleepstatic.com\u002Fcontent\u002Fhl-images\u002F2025\u002F05\u002F28\u002FWindows-headpic.jpg","2026-05-20T07:31:15+00:00","2026-05-20T08:00:19.579921+00:00",9,[18,21,24,26,29],{"name":19,"type":20},"Microsoft","vendor",{"name":22,"type":23},"Windows BitLocker","product",{"name":25,"type":23},"Windows Recovery Environment (WinRE)",{"name":27,"type":28},"Nightmare Eclipse","threat_actor",{"name":30,"type":23},"Microsoft Defender","574f766a-fb3f-487c-8d2c-0720ae75471b",{"id":31,"icon":33,"name":34,"slug":35},null,"Zero-day","zero-day",[37,42],{"category":38},{"id":39,"icon":33,"name":40,"slug":41},"80544778-fabb-4dcd-aa35-17492e5dcf4f","Vulnerabilities","vulnerabilities",{"category":43},{"id":44,"icon":33,"name":45,"slug":46},"89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5","Malware","malware",[48,52,55,58,61],{"type":49,"value":50,"context":51},"cve","CVE-2026-45585","YellowKey Windows BitLocker security feature bypass vulnerability",{"type":49,"value":53,"context":54},"CVE-2026-33825","BlueHammer local privilege escalation zero-day",{"type":46,"value":56,"context":57},"RedSun","Local privilege escalation zero-day disclosed by Nightmare Eclipse",{"type":46,"value":59,"context":60},"GreenPlasma","Zero-day privilege escalation flaw enabling SYSTEM shell access",{"type":46,"value":62,"context":63},"UnDefend","Zero-day exploit allowing standard users to block Windows Defender definition updates"]