CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 14, 2026

Researcher Drops YellowKey, GreenPlasma Windows Zero-Days

Security Week Archived May 14, 2026 ✓ Full text saved

YellowKey is a BitLocker bypass that requires physical access. GreenPlasma enables elevation of privileges to System. The post Researcher Drops YellowKey, GreenPlasma Windows Zero-Days appeared first on SecurityWeek .

Full text archived locally
✦ AI Summary · Claude Sonnet


    A disgruntled security researcher this week publicly disclosed two zero-day vulnerabilities in Windows that enable BitLocker bypass and privilege escalation. BitLocker, Windows’ built-in full-volume encryption feature, relies on TPM (Trusted Platform Module) to deliver hardware-based security, protecting users’ data from unauthorized access if the device is stolen or lost. On Tuesday, a cybersecurity researcher known as Chaotic Eclipse and Nightmare Eclipse published proof-of-concept (PoC) code that allows an attacker with physical access to a machine running Windows 11 to bypass BitLocker and gain unrestricted access to the storage volume. The exploit has been dubbed YellowKey. This is not the first time Chaotic Eclipse has disclosed unpatched vulnerabilities in Microsoft products, and the researcher previously suggested they are displeased with the tech giant’s handling of vulnerability reports.  According to the researcher, the underlying issue for YellowKey is a well-hidden vulnerability without an explicit root cause, and could be a backdoor intentionally planted into BitLocker. The researcher’s exploit chain begins with copying a PoC folder to a USB drive and plugging it into a Windows machine that has BitLocker on, albeit copying the files to the EFI partition could do the trick without the removable drive. Next, one would need to reboot the device to Windows Recovery Environment (WinRE) by holding the Shift key while clicking ‘Restart’, then immediately release Shift and press and hold the Ctrl key until a command prompt window spawns, providing access to the protected volume. “Now, why would I say this is a backdoor? The component that is responsible for this bug is not present anywhere (even on the internet) except inside WinRE image, and what makes it raise suspicions is the fact that the exact same component is also present with the exact same name in a normal Windows installation, but without the functionalities that trigger the BitLocker bypass issue,” Chaotic Eclipse notes. Several security researchers, including Kevin Beaumont, KevTheHermit, and Will Dormann, have tested the exploit and confirmed it works even against recent Windows 11 builds. Chaotic Eclipse warned that YellowKey also works on devices protected with a TPM PIN (the user-defined, pre-boot authentication code required to unlock the machine), but refrained from publishing the PoC for this bypass. According to security researchers who tested the PoC exploit, such as JaGoTu, the success of a TPM PIN attack appears to depend on the WinRe implementation.   YellowKey reminds of a Windows vulnerability discovered a decade ago, which enabled BitLocker bypass by holding SHIFT+F10 pressed during feature updates in Windows 10. It spawned a shell providing admin privileges while BitLocker was disabled. The second zero-day Windows exploit dropped by Chaotic Eclipse is named GreenPlasma and allows attackers to elevate their privileges to System. The researcher published a PoC exploit stripped of the code required to achieve a full System shell. “The PoC will create an arbitrary memory section object in any directory object writeable by System,” Chaotic Eclipse noted, explaining that it could be used to manipulate various Windows services, including kernel-mode drivers. “Even with limitations around the current proof-of-concept, any path toward System-level privileges deserves close scrutiny. If fully exploited, that kind of escalation could allow attackers to disable protections, manipulate trusted processes, deploy malware, or use the compromised machine as a stepping stone into the broader environment,” Swimlane principal security solution architect Joshua Roback said. According to Corsica Technologies CISO Ross Filipek, the newly released PoC code could allow attackers to quickly weaponize their own exploits and start targeting the zero-day flaws in the wild. “Public zero-day releases always change the risk equation because they shrink the window between discovery and exploitation. In this case, YellowKey and GreenPlasma expose two different but connected concerns: access to protected data and the potential for privilege escalation. Even when an exploit has limitations, proof-of-concept code gives attackers a starting point they can test, modify, and fold into broader intrusion chains,” Filipek said. SecurityWeek has emailed Microsoft for a statement on the zero-day exploits and will update this article if the company responds. In early April, Chaotic Eclipse published PoC exploit code targeting BlueHammer, a Windows Defender security defect patched by Microsoft on April Patch Tuesday. Threat actors started exploiting it four days before the fixes were rolled out. Related: Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises Related: Microsoft Patches 137 Vulnerabilities Related: Google Detects First AI-Generated Zero-Day Exploit Related: Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? WRITTEN BY Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Chipmaker Patch Tuesday: Intel and AMD Patch 70 Vulnerabilities Microsoft Patches 137 Vulnerabilities Adobe Patches 52 Vulnerabilities in 10 Products White Circle Raises $11 Million for AI Control Platform West Pharmaceutical Services Hit by Disruptive Ransomware Attack SAP Patches Critical S/4HANA, Commerce Vulnerabilities TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack Skoda Data Breach Hits Online Shop Customers Latest News Foxconn Confirms North American Factories Hit by Cyberattack Microsoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code Sweet Security Launches Agentic AI Red Teaming to Counter ‘Mythos Moment’ Webinar Today: ROI for Cyber-Physical Security Programs Government to Scrutinize Instructure Over Canvas Disruption, Data Breach 716,000 Impacted by OpenLoop Health Data Breach Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises Fortinet, Ivanti Patch Critical Vulnerabilities Trending Webinar: ROSI For CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection And Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the Move Malwarebytes has named Chung Ip as Chief Financial Officer. Semperis has appointed John Podboy as Chief Information Security Officer. Randy Menon has become Chief Product and Marketing Officer at One Identity. More People On The Move Expert Insights Is The SOC Obsolete, And We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents With Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense In The Age Of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win The Cyber War Without The Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI Of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) Flipboard Reddit Whatsapp Email
    💬 Team Notes
    Article Info
    Source
    Security Week
    Category
    ◇ Industry News & Leadership
    Published
    May 14, 2026
    Archived
    May 14, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗