BitLocker bypassed: a simple key extraction is enough to break the encryption

Bitlocker Recovery Hacked

A critical vulnerability referenced CVE-2023-21563 allows bypassing Microsoft’s BitLocker encryption in less than five minutes through a purely software-based attack called “Bitpixie.” The issue comes from the Windows bootloader which does not properly clean the encryption key (VMK) from memory after a PXE reboot. Two methods have been publicly demonstrated. The first uses a signed Linux environment to extract the VMK from memory. The second relies exclusively on Microsoft-signed components in a modified Windows PE environment. Both approaches allow decrypting a BitLocker-protected drive without prior authentication. A proof of concept is already available online. The only effective mitigation is to enable pre-boot authentication using a PIN, USB key, or key file.

Our experts’ analysis:
Microsoft has been praising the security of its encryption for years while promoting a default usage mode that is vulnerable, with no PIN or password. The result: an actor with physical access can extract the encryption key effortlessly, even on modern machines. The real risk here is not the use of an advanced technique but the illusion of protection.

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

Discord ID card breach

When Customer Support Becomes the Weakest Link: Lessons from the Discord Breach

How Businesses Can Protect Themselves From MatrixPDF Attacks

MatrixPDF Puts Gmail Users at Risk with Malicious PDF Attachments

Swiss e-ID and UAE Pass

Swiss e-ID vs UAE Pass: managing digital government identity