A zero-day exploit circulating online allows individuals with physical access to a Windows 11 system to bypass default BitLocker protections and gain complete access to an encrypted drive within seconds.

The exploit, named YellowKey, was published earlier this week by a researcher who goes by the alias Nightmare-Eclipse. It reliably bypasses default Windows 11 deployments of BitLocker, the full-volume encryption protection Microsoft provides to make disk contents inaccessible without the decryption key. This key is stored in a secured hardware component known as a trusted platform module (TPM).

BitLocker is a mandatory protection for many organizations, including those that contract with governments, due to its role in securing sensitive data.

How the YellowKey Exploit Works

The core of the YellowKey exploit involves a custom-made FsTx folder, a directory associated with the file fstx.dll. This folder appears to leverage Microsoft’s transactional NTFS (TxF), a feature that enables developers to perform file operations with transactional atomicity. This means operations on a single file, multiple files, or files spanning multiple sources can be executed atomically—either fully completed or fully rolled back in case of failure.

Online documentation for the FsTx folder is scarce, making it difficult to trace its origins or intended use. However, the exploit’s ability to manipulate transactional NTFS operations appears central to bypassing BitLocker’s protections.

Implications for Windows 11 Users

The discovery of YellowKey raises significant concerns for Windows 11 users who rely on BitLocker for data security. Since the exploit requires physical access to the target system, it primarily poses a threat in scenarios where devices are left unattended or stolen. However, the speed at which the exploit can bypass encryption—within seconds—amplifies the risk.

Organizations, particularly those handling government contracts or sensitive data, may face heightened security risks if this exploit is weaponized in the wild. Microsoft has not yet issued an official response or patch addressing the YellowKey vulnerability.

What Users Can Do to Mitigate Risks

  • Enable additional authentication methods: Use multi-factor authentication (MFA) or a strong PIN in addition to BitLocker’s TPM-based protection.
  • Secure physical access: Ensure Windows 11 devices are not left unattended in public or unsecured locations.
  • Monitor for unusual activity: Implement endpoint detection and response (EDR) solutions to identify potential breaches.
  • Keep software updated: Regularly install Windows updates to patch known vulnerabilities and enhance system security.

As of now, the YellowKey exploit remains a critical vulnerability with no official patch from Microsoft. Users are advised to take proactive steps to mitigate potential risks until a fix is available.