BitLocker bypassed: a simple key extraction is enough to break the encryption

Bitlocker Recovery Hacked

A critical vulnerability referenced CVE-2023-21563 allows bypassing Microsoft’s BitLocker encryption in less than five minutes through a purely software-based attack called “Bitpixie.” The issue comes from the Windows bootloader which does not properly clean the encryption key (VMK) from memory after a PXE reboot. Two methods have been publicly demonstrated. The first uses a signed Linux environment to extract the VMK from memory. The second relies exclusively on Microsoft-signed components in a modified Windows PE environment. Both approaches allow decrypting a BitLocker-protected drive without prior authentication. A proof of concept is already available online. The only effective mitigation is to enable pre-boot authentication using a PIN, USB key, or key file.

Our experts’ analysis:
Microsoft has been praising the security of its encryption for years while promoting a default usage mode that is vulnerable, with no PIN or password. The result: an actor with physical access can extract the encryption key effortlessly, even on modern machines. The real risk here is not the use of an advanced technique but the illusion of protection.

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

Swiss intelligence leak

The Swiss Intelligence Leak: Former NDB Officer Transmitted Classified Information to Russia via Kaspersky

FIN6 phishing campaign

Skeleton Spider’s Cloud Tactics Expose Recruiters to Stealth Malware

Critical CVE Trend Micro Breach

Trend Micro fixes Critical Vulnerabilities in Apex Central and Encryption Products