Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The Interspeech 2025 Speech Accessibility Venture Problem

    August 9, 2025

    A number of Zero-Day Exploits Uncover That Bypass BitLocker, Exposing All Encrypted Knowledge

    August 9, 2025

    Anthropic income tied to 2 prospects as AI pricing struggle threatens margins

    August 9, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»A number of Zero-Day Exploits Uncover That Bypass BitLocker, Exposing All Encrypted Knowledge
    AI Ethics & Regulation

    A number of Zero-Day Exploits Uncover That Bypass BitLocker, Exposing All Encrypted Knowledge

    Declan MurphyBy Declan MurphyAugust 9, 2025No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    A number of Zero-Day Exploits Uncover That Bypass BitLocker, Exposing All Encrypted Knowledge
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Microsoft safety researchers have uncovered 4 important vulnerabilities in Home windows BitLocker that might enable attackers with bodily entry to bypass the encryption system and extract delicate knowledge.

    The findings, revealed in analysis dubbed “BitUnlocker,” show subtle assault strategies focusing on the Home windows Restoration Setting (WinRE) to bypass Microsoft’s flagship knowledge safety expertise.

    Safety Flaws Goal Home windows Restoration Setting

    The vulnerabilities, found by Alon Leviev and Netanel Ben Simon from Microsoft’s Offensive Analysis & Safety Engineering (MORSE) workforce, exploit weaknesses in how WinRE processes exterior information and configurations.

    The researchers recognized 4 distinct assault vectors that enable unauthorized entry to BitLocker-protected programs:

    • CVE-2025-48800 allows attackers to bypass WIM (Home windows Imaging Format) validation by manipulating the Boot.sdi file’s offset pointer, inflicting the system as well an untrusted restoration atmosphere whereas validating a trusted one.
    • CVE-2025-48003 exploits ReAgent.xml parsing to schedule malicious operations, together with launching tttracer.exe to execute command prompts with full system entry.
    • CVE-2025-48804 leverages WinRE app belief validation by using the pre-registered SetupPlatform.exe to realize persistent command-line entry via keyboard shortcuts.
    • CVE-2025-48818 targets BCD (Boot Configuration Knowledge) parsing to redirect WinRE’s goal OS location, enabling Push Button Reset exploitation to decrypt BitLocker volumes.

    The analysis reveals that WinRE, designed as a restoration platform for important system points, inadvertently creates an assault floor when parsing configuration information from unprotected volumes.

    Attackers can manipulate these exterior information to realize elevated privileges and entry encrypted knowledge with out triggering BitLocker’s commonplace safety mechanisms.

    Microsoft Responds with July 2025 Safety Patches

    Microsoft addressed all 4 vulnerabilities as a part of its July 2025 Patch Tuesday launch, issuing complete safety updates throughout affected Home windows variations.

    The patches goal Home windows 10 (variations 1607, 21H2, 22H2), Home windows 11 (variations 22H2, 23H2, 24H2), and Home windows Server editions (2016, 2022, 2025).

    Safety updates KB5062552, KB5062553, KB5062554, and KB5062560 particularly deal with the BitLocker vulnerabilities, with organizations urged to prioritize rapid deployment.

    The vulnerabilities carry CVSS scores starting from 6.8 to eight.1, with Microsoft assessing exploitation as “extra doubtless” for a number of of the issues.

    The analysis workforce’s findings have been scheduled for presentation at Black Hat USA 2025 in Las Vegas, highlighting the importance of the discoveries inside the cybersecurity neighborhood.

    The presentation, titled “BitUnlocker: Leveraging Home windows Restoration to Extract BitLocker Secrets and techniques,” demonstrates the researchers’ complete evaluation of WinRE’s safety structure and assault methodologies.

    Enhanced Safety Methods and Trade Influence

    Past making use of the safety patches, Microsoft recommends implementing further BitLocker countermeasures to strengthen safety in opposition to bodily assaults.

    Organizations ought to allow TPM+PIN for pre-boot authentication, which provides a further authentication layer earlier than the system boots, considerably decreasing the danger of bodily bypass makes an attempt.

    Microsoft additionally advises enabling the REVISE mitigation for anti-rollback safety, which prevents attackers from downgrading to susceptible system states.

    These enhanced protections work together with the safety patches to supply complete protection in opposition to the recognized assault vectors.

    The discoveries underscore the significance of defense-in-depth methods for knowledge safety, notably in situations involving bodily machine entry.

    Whereas BitLocker stays a sturdy encryption answer, the analysis demonstrates that even subtle safety programs require steady analysis and enchancment to handle rising risk vectors.

    The BitUnlocker analysis represents a big contribution to understanding encryption bypass methods and reinforces the important position of inner safety analysis groups in figuring out and addressing vulnerabilities earlier than they are often exploited maliciously.

    Organizations counting on BitLocker for knowledge safety ought to prioritize making use of the July 2025 safety updates whereas implementing the advisable further safety measures to keep up sturdy safety in opposition to bodily assaults.

    Discover this Information Fascinating! Comply with us on Google Information, LinkedIn, & X to Get Prompt Updates!

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Black Hat: Researchers display zero-click immediate injection assaults in standard AI brokers

    August 9, 2025

    15,000 Jenkins Servers at Danger from RCE Vulnerability (CVE-2025-53652)

    August 9, 2025

    AI Instruments Gas Brazilian Phishing Rip-off Whereas Efimer Trojan Steals Crypto from 5,000 Victims

    August 8, 2025
    Top Posts

    The Interspeech 2025 Speech Accessibility Venture Problem

    August 9, 2025

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    The Interspeech 2025 Speech Accessibility Venture Problem

    By Oliver ChambersAugust 9, 2025

    Whereas the final decade has witnessed important developments in Computerized Speech Recognition (ASR) methods, efficiency…

    A number of Zero-Day Exploits Uncover That Bypass BitLocker, Exposing All Encrypted Knowledge

    August 9, 2025

    Anthropic income tied to 2 prospects as AI pricing struggle threatens margins

    August 9, 2025

    Automate enterprise workflows by integrating Salesforce Agentforce with Amazon Bedrock Brokers

    August 9, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.