Cybersecurity

YellowKey Zero-Day Exploit: Bypassing Windows 11 BitLocker Encryption with Physical Access

2026-05-20 00:01:18

Overview of the YellowKey Threat

A recently discovered zero-day exploit, dubbed YellowKey, poses a serious risk to Windows 11 systems protected by default BitLocker encryption. Published by the researcher Nightmare-Eclipse, this attack requires physical access to the machine and can decrypt the drive in seconds, effectively rendering Microsoft’s full-volume encryption useless in its default configuration.

YellowKey Zero-Day Exploit: Bypassing Windows 11 BitLocker Encryption with Physical Access
Source: feeds.arstechnica.com

BitLocker is a mandatory security feature for many organizations, especially those handling government contracts. It leverages a Trusted Platform Module (TPM) to store the decryption key, making the drive inaccessible without it. However, as YellowKey demonstrates, the default implementation has a critical flaw that can be exploited through a custom file system manipulation technique.

How BitLocker Works and Its Default Configuration

BitLocker encrypts the entire Windows volume using AES encryption. In its default deployment on Windows 11, the encryption key is sealed within the TPM chip. During boot, the TPM releases the key only if the system state matches a pre-defined trusted profile (e.g., no boot loader changes). This is meant to protect against offline attacks where an adversary removes the hard drive and attempts to read its contents.

However, the default settings do not require a PIN or startup key (such as a USB drive), which makes the system vulnerable to an attack that manipulates the boot process before the TPM validation occurs. The YellowKey exploit capitalizes on this gap.

The YellowKey Exploit: Technique and Execution

To execute the attack, an individual must have physical access to the target device. The exploit uses a specially crafted FsTx folder to interfere with the boot process. The folder name refers to a little-known Windows feature called Transactional NTFS (TxF), which allows file operations to be performed in atomic transactions. The custom folder contains a file named fstx.dll that triggers the exploit.

When the system starts, the exploit manipulates the Volume Boot Code to gain control before BitLocker’s TPM validation checkpoint. This allows the attacker to bypass the encryption check entirely, as the TPM releases the key to what it considers a trusted boot environment. Once the key is obtained, the attacker gains full access to the encrypted drive within seconds.

The Role of Transactional NTFS in the Attack

Transactional NTFS (TxF) is a feature that enables developers to group multiple file operations into a single transaction. If any operation fails, the entire transaction is rolled back, ensuring consistency. In the YellowKey exploit, the FsTx folder exploits TxF to create a malicious boot environment that the TPM mistakenly considers trusted. This is the core mechanism that allows the attack to succeed without triggering the TPM’s integrity checks.

While Microsoft has deprecated TxF in recent Windows versions, its underlying code remains present, providing the necessary hooks for YellowKey to function.

Implications for Security and Organizations

The YellowKey exploit undermines the foundational assumption that BitLocker (in default mode) provides robust protection against offline attacks. Organizations that mandate BitLocker without additional authentication factors—such as a PIN or a pre-boot password—are left exposed. The attack is especially concerning for devices that handle sensitive data, such as laptops used by government contractors or employees in security-conscious industries.

Because the exploit requires physical access, it is most likely to be employed in scenarios where an attacker can temporarily seize a device, such as in airports, coffee shops, or shared office spaces. The speed of the attack (seconds) means that even brief access is sufficient.

YellowKey Zero-Day Exploit: Bypassing Windows 11 BitLocker Encryption with Physical Access
Source: feeds.arstechnica.com

Mitigation Steps and Recommendations

Users and organizations can reduce the risk by implementing additional layers of protection:

Technical Insights: Why Default BitLocker Is Vulnerable

The root cause of the vulnerability lies in the trusted boot chain. By default, Windows boot manager validates the boot components, but the FsTx exploit inserts a malicious component before the TPM measurement. The TPM then releases the key to this new, untrusted environment, effectively bypassing the intended protection.

The exploit’s reliance on fstx.dll indicates that the attack vector targets the file system driver responsible for transactional operations. Because TxF is seldom used, it is less scrutinized by security researchers and developers, making it a favorable target for zero-day discoveries.

For a deeper understanding of the exploit mechanics, readers can refer to the original research published by Nightmare-Eclipse. However, technical details remain sparse because the author has not fully documented the FsTx folder structure.

Conclusion

The YellowKey zero-day exploit highlights a critical gap in default Windows 11 BitLocker deployments. While BitLocker remains a strong encryption solution when properly configured, the default TPM-only mode is insufficient against physical attacks that manipulate the boot process before TPM validation. Organizations and individuals must move beyond default settings and adopt multi-factor authentication for pre-boot environments. As the security community analyzes this exploit, users should prioritize immediate mitigations to prevent unauthorized access to encrypted data.

Explore

Why Routine Software Flaws Are Becoming Critical in the AI Era Canonical Services Under Sustained Cyberattack: Snap Store, Ubuntu Website, and Launchpad Affected OpenAI Staff Sound Alarm: ChatGPT Violence Plans Not Reported to Police, Sources Say Upcoming Linux 7.2 Kernel: Fair Scheduler and AMD AIE4 Support The Hidden Cost of a 'Bug-Free' Workplace: How Small Interactions Build Strong Teams