Scoopfeeds — Intelligent news, curated.
Zero-day exploit completely defeats default Windows 11 BitLocker protections
computer-science

Zero-day exploit completely defeats default Windows 11 BitLocker protections

Ars Technica · May 14, 2026, 6:32 PM · Also reported by 1 other source

A zero-day exploit circulating online allows people with physical access to a Windows 11 system to bypass default Bit Locker protections and gain complete access to an encrypted drive within seconds. The exploit, named Yellow Key, was published earlier this week by a researcher who goes by the alias Nightmare-Eclipse. It reliably bypasses default Windows 11 deployments of Bit Locker, the full-volume encryption protection Microsoft provides to make disk contents off-limits to anyone without the decryption key, which is stored in a secured piece of hardware known as a trusted platform module (TPM). BitLocker is a mandatory protection for many organizations, including those that contract with governments. When one disk volume manipulates another The core of the YellowKey exploit is a custom-made FsTx folder. Online documentation of this folder is hard to find. As explained later, the directory associated with the file fstx.dll appears to involve what Microsoft calls the transactional NTFS, which allows developers to have “transactional atomicity" for file operations in transactions with a single file, multiple files, or ones that span multiple sources.Read full article Comments

Article preview — originally published by Ars Technica. Full story at the source.
Read full story on Ars Technica → More top stories

Also covered by

Aggregated and edited by the Scoop newsroom. We surface news from Ars Technica alongside other reporting so you can compare coverage in one place. Editorial policy · Corrections · About Scoop