Next, one would need to reboot the device to Windows Recovery Environment(WinRE) by holding the Shift key while clicking ‘Restart’, then immediately release Shift and press and hold the Ctrl key until a command prompt window spawns, providing access to the protected volume.“Now, why would I say this is a backdoor? The component that is responsible for this bug is not present anywhere (even on the internet) except inside WinRE image, and what makes it raise suspicions is the fact that the exact same component is also present with the exact same name in a normal Windows installation, but without the functionalities that trigger the BitLocker bypass issue,” Chaotic Eclipsenotes.Several security researchers, includingKevin Beaumont,KevTheHermit, and Will Dormann, have tested the exploit and confirmed it works even against recent Windows 11 builds.Chaotic Eclipsewarnedthat YellowKey also works on devices protected with a TPM PIN (the user-defined, pre-boot authentication code required to unlock the machine), but refrained from publishing the PoC for this bypass.According to security researchers who tested the PoC exploit, such asJaGoTu, the success of a TPM PIN attack appears to depend on the WinRe implementation.YellowKey reminds of a Windows vulnerability discovered a decade ago, which enabled BitLocker bypass byholding SHIFT+F10 pressedduring feature updates in Windows 10. It spawned a shell providing admin privileges while BitLocker was disabled.The second zero-day Windows exploit dropped by Chaotic Eclipse is namedGreenPlasmaand allows attackers to elevate their privileges to System. The researcher published a PoC exploit stripped of the code required to achieve a full System shell.“The PoC will create an arbitrary memory section object in any directory object writeable by System,” Chaotic Eclipse noted, explaining that it could be used to manipulate various Windows services, including kernel-mode drivers.“Even with limitations around the current proof-of-concept, any path toward System-level privileges deserves close scrutiny. If fully exploited, that kind of escalation could allow attackers to disable protections, manipulate trusted processes, deploy malware, or use the compromised machine as a stepping stone into the broader environment,” Swimlane principal security solution architect Joshua Roback said.According to Corsica Technologies CISO Ross Filipek, the newly released PoC code could allow attackers to quickly weaponize their own exploits and start targeting the zero-day flaws in the wild.“Public zero-day releases always change the risk equation because they shrink the window between discovery and exploitation. In this case, YellowKey and GreenPlasma expose two different but connected concerns: access to protected data and the potential for privilege escalation. Even when an exploit has limitations, proof-of-concept code gives attackers a starting point they can test, modify, and fold into broader intrusion chains,” Filipek said.SecurityWeekhas emailed Microsoft for a statement on the zero-day exploits and will update this article if the company responds.In early April, Chaotic Eclipse published PoC exploit code targeting BlueHammer, a Windows Defender security defect patched by Microsoft onApril Patch Tuesday. Threat actorsstarted exploitingit four days before the fixes were rolled out.Related:Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesRelated:Microsoft Patches 137 VulnerabilitiesRelated:Google Detects First AI-Generated Zero-Day ExploitRelated:Is the SOC Obsolete, and We Just Haven’t Admitted It Yet?

“Now, why would I say this is a backdoor? The component that is responsible for this bug is not present anywhere (even on the internet) except inside WinRE image, and what makes it raise suspicions is the fact that the exact same component is also present with the exact same name in a normal Windows installation, but without the functionalities that trigger the BitLocker bypass issue,” Chaotic Eclipsenotes.Several security researchers, includingKevin Beaumont,KevTheHermit, and Will Dormann, have tested the exploit and confirmed it works even against recent Windows 11 builds.Chaotic Eclipsewarnedthat YellowKey also works on devices protected with a TPM PIN (the user-defined, pre-boot authentication code required to unlock the machine), but refrained from publishing the PoC for this bypass.According to security researchers who tested the PoC exploit, such asJaGoTu, the success of a TPM PIN attack appears to depend on the WinRe implementation.YellowKey reminds of a Windows vulnerability discovered a decade ago, which enabled BitLocker bypass byholding SHIFT+F10 pressedduring feature updates in Windows 10. It spawned a shell providing admin privileges while BitLocker was disabled.The second zero-day Windows exploit dropped by Chaotic Eclipse is namedGreenPlasmaand allows attackers to elevate their privileges to System. The researcher published a PoC exploit stripped of the code required to achieve a full System shell.“The PoC will create an arbitrary memory section object in any directory object writeable by System,” Chaotic Eclipse noted, explaining that it could be used to manipulate various Windows services, including kernel-mode drivers.“Even with limitations around the current proof-of-concept, any path toward System-level privileges deserves close scrutiny. If fully exploited, that kind of escalation could allow attackers to disable protections, manipulate trusted processes, deploy malware, or use the compromised machine as a stepping stone into the broader environment,” Swimlane principal security solution architect Joshua Roback said.According to Corsica Technologies CISO Ross Filipek, the newly released PoC code could allow attackers to quickly weaponize their own exploits and start targeting the zero-day flaws in the wild.“Public zero-day releases always change the risk equation because they shrink the window between discovery and exploitation. In this case, YellowKey and GreenPlasma expose two different but connected concerns: access to protected data and the potential for privilege escalation. Even when an exploit has limitations, proof-of-concept code gives attackers a starting point they can test, modify, and fold into broader intrusion chains,” Filipek said.SecurityWeekhas emailed Microsoft for a statement on the zero-day exploits and will update this article if the company responds.In early April, Chaotic Eclipse published PoC exploit code targeting BlueHammer, a Windows Defender security defect patched by Microsoft onApril Patch Tuesday. Threat actorsstarted exploitingit four days before the fixes were rolled out.Related:Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesRelated:Microsoft Patches 137 VulnerabilitiesRelated:Google Detects First AI-Generated Zero-Day ExploitRelated:Is the SOC Obsolete, and We Just Haven’t Admitted It Yet?

Several security researchers, includingKevin Beaumont,KevTheHermit, and Will Dormann, have tested the exploit and confirmed it works even against recent Windows 11 builds.Chaotic Eclipsewarnedthat YellowKey also works on devices protected with a TPM PIN (the user-defined, pre-boot authentication code required to unlock the machine), but refrained from publishing the PoC for this bypass.According to security researchers who tested the PoC exploit, such asJaGoTu, the success of a TPM PIN attack appears to depend on the WinRe implementation.YellowKey reminds of a Windows vulnerability discovered a decade ago, which enabled BitLocker bypass byholding SHIFT+F10 pressedduring feature updates in Windows 10. It spawned a shell providing admin privileges while BitLocker was disabled.The second zero-day Windows exploit dropped by Chaotic Eclipse is namedGreenPlasmaand allows attackers to elevate their privileges to System. The researcher published a PoC exploit stripped of the code required to achieve a full System shell.“The PoC will create an arbitrary memory section object in any directory object writeable by System,” Chaotic Eclipse noted, explaining that it could be used to manipulate various Windows services, including kernel-mode drivers.“Even with limitations around the current proof-of-concept, any path toward System-level privileges deserves close scrutiny. If fully exploited, that kind of escalation could allow attackers to disable protections, manipulate trusted processes, deploy malware, or use the compromised machine as a stepping stone into the broader environment,” Swimlane principal security solution architect Joshua Roback said.According to Corsica Technologies CISO Ross Filipek, the newly released PoC code could allow attackers to quickly weaponize their own exploits and start targeting the zero-day flaws in the wild.“Public zero-day releases always change the risk equation because they shrink the window between discovery and exploitation. In this case, YellowKey and GreenPlasma expose two different but connected concerns: access to protected data and the potential for privilege escalation. Even when an exploit has limitations, proof-of-concept code gives attackers a starting point they can test, modify, and fold into broader intrusion chains,” Filipek said.SecurityWeekhas emailed Microsoft for a statement on the zero-day exploits and will update this article if the company responds.In early April, Chaotic Eclipse published PoC exploit code targeting BlueHammer, a Windows Defender security defect patched by Microsoft onApril Patch Tuesday. Threat actorsstarted exploitingit four days before the fixes were rolled out.Related:Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesRelated:Microsoft Patches 137 VulnerabilitiesRelated:Google Detects First AI-Generated Zero-Day ExploitRelated:Is the SOC Obsolete, and We Just Haven’t Admitted It Yet?

Chaotic Eclipsewarnedthat YellowKey also works on devices protected with a TPM PIN (the user-defined, pre-boot authentication code required to unlock the machine), but refrained from publishing the PoC for this bypass.According to security researchers who tested the PoC exploit, such asJaGoTu, the success of a TPM PIN attack appears to depend on the WinRe implementation.YellowKey reminds of a Windows vulnerability discovered a decade ago, which enabled BitLocker bypass byholding SHIFT+F10 pressedduring feature updates in Windows 10. It spawned a shell providing admin privileges while BitLocker was disabled.The second zero-day Windows exploit dropped by Chaotic Eclipse is namedGreenPlasmaand allows attackers to elevate their privileges to System. The researcher published a PoC exploit stripped of the code required to achieve a full System shell.“The PoC will create an arbitrary memory section object in any directory object writeable by System,” Chaotic Eclipse noted, explaining that it could be used to manipulate various Windows services, including kernel-mode drivers.“Even with limitations around the current proof-of-concept, any path toward System-level privileges deserves close scrutiny. If fully exploited, that kind of escalation could allow attackers to disable protections, manipulate trusted processes, deploy malware, or use the compromised machine as a stepping stone into the broader environment,” Swimlane principal security solution architect Joshua Roback said.According to Corsica Technologies CISO Ross Filipek, the newly released PoC code could allow attackers to quickly weaponize their own exploits and start targeting the zero-day flaws in the wild.“Public zero-day releases always change the risk equation because they shrink the window between discovery and exploitation. In this case, YellowKey and GreenPlasma expose two different but connected concerns: access to protected data and the potential for privilege escalation. Even when an exploit has limitations, proof-of-concept code gives attackers a starting point they can test, modify, and fold into broader intrusion chains,” Filipek said.SecurityWeekhas emailed Microsoft for a statement on the zero-day exploits and will update this article if the company responds.In early April, Chaotic Eclipse published PoC exploit code targeting BlueHammer, a Windows Defender security defect patched by Microsoft onApril Patch Tuesday. Threat actorsstarted exploitingit four days before the fixes were rolled out.Related:Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesRelated:Microsoft Patches 137 VulnerabilitiesRelated:Google Detects First AI-Generated Zero-Day ExploitRelated:Is the SOC Obsolete, and We Just Haven’t Admitted It Yet?

According to security researchers who tested the PoC exploit, such asJaGoTu, the success of a TPM PIN attack appears to depend on the WinRe implementation.YellowKey reminds of a Windows vulnerability discovered a decade ago, which enabled BitLocker bypass byholding SHIFT+F10 pressedduring feature updates in Windows 10. It spawned a shell providing admin privileges while BitLocker was disabled.The second zero-day Windows exploit dropped by Chaotic Eclipse is namedGreenPlasmaand allows attackers to elevate their privileges to System. The researcher published a PoC exploit stripped of the code required to achieve a full System shell.“The PoC will create an arbitrary memory section object in any directory object writeable by System,” Chaotic Eclipse noted, explaining that it could be used to manipulate various Windows services, including kernel-mode drivers.“Even with limitations around the current proof-of-concept, any path toward System-level privileges deserves close scrutiny. If fully exploited, that kind of escalation could allow attackers to disable protections, manipulate trusted processes, deploy malware, or use the compromised machine as a stepping stone into the broader environment,” Swimlane principal security solution architect Joshua Roback said.According to Corsica Technologies CISO Ross Filipek, the newly released PoC code could allow attackers to quickly weaponize their own exploits and start targeting the zero-day flaws in the wild.“Public zero-day releases always change the risk equation because they shrink the window between discovery and exploitation. In this case, YellowKey and GreenPlasma expose two different but connected concerns: access to protected data and the potential for privilege escalation. Even when an exploit has limitations, proof-of-concept code gives attackers a starting point they can test, modify, and fold into broader intrusion chains,” Filipek said.SecurityWeekhas emailed Microsoft for a statement on the zero-day exploits and will update this article if the company responds.In early April, Chaotic Eclipse published PoC exploit code targeting BlueHammer, a Windows Defender security defect patched by Microsoft onApril Patch Tuesday. Threat actorsstarted exploitingit four days before the fixes were rolled out.Related:Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesRelated:Microsoft Patches 137 VulnerabilitiesRelated:Google Detects First AI-Generated Zero-Day ExploitRelated:Is the SOC Obsolete, and We Just Haven’t Admitted It Yet?

YellowKey reminds of a Windows vulnerability discovered a decade ago, which enabled BitLocker bypass byholding SHIFT+F10 pressedduring feature updates in Windows 10. It spawned a shell providing admin privileges while BitLocker was disabled.The second zero-day Windows exploit dropped by Chaotic Eclipse is namedGreenPlasmaand allows attackers to elevate their privileges to System. The researcher published a PoC exploit stripped of the code required to achieve a full System shell.“The PoC will create an arbitrary memory section object in any directory object writeable by System,” Chaotic Eclipse noted, explaining that it could be used to manipulate various Windows services, including kernel-mode drivers.“Even with limitations around the current proof-of-concept, any path toward System-level privileges deserves close scrutiny. If fully exploited, that kind of escalation could allow attackers to disable protections, manipulate trusted processes, deploy malware, or use the compromised machine as a stepping stone into the broader environment,” Swimlane principal security solution architect Joshua Roback said.According to Corsica Technologies CISO Ross Filipek, the newly released PoC code could allow attackers to quickly weaponize their own exploits and start targeting the zero-day flaws in the wild.“Public zero-day releases always change the risk equation because they shrink the window between discovery and exploitation. In this case, YellowKey and GreenPlasma expose two different but connected concerns: access to protected data and the potential for privilege escalation. Even when an exploit has limitations, proof-of-concept code gives attackers a starting point they can test, modify, and fold into broader intrusion chains,” Filipek said.SecurityWeekhas emailed Microsoft for a statement on the zero-day exploits and will update this article if the company responds.In early April, Chaotic Eclipse published PoC exploit code targeting BlueHammer, a Windows Defender security defect patched by Microsoft onApril Patch Tuesday. Threat actorsstarted exploitingit four days before the fixes were rolled out.Related:Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesRelated:Microsoft Patches 137 VulnerabilitiesRelated:Google Detects First AI-Generated Zero-Day ExploitRelated:Is the SOC Obsolete, and We Just Haven’t Admitted It Yet?

The second zero-day Windows exploit dropped by Chaotic Eclipse is namedGreenPlasmaand allows attackers to elevate their privileges to System. The researcher published a PoC exploit stripped of the code required to achieve a full System shell.“The PoC will create an arbitrary memory section object in any directory object writeable by System,” Chaotic Eclipse noted, explaining that it could be used to manipulate various Windows services, including kernel-mode drivers.“Even with limitations around the current proof-of-concept, any path toward System-level privileges deserves close scrutiny. If fully exploited, that kind of escalation could allow attackers to disable protections, manipulate trusted processes, deploy malware, or use the compromised machine as a stepping stone into the broader environment,” Swimlane principal security solution architect Joshua Roback said.According to Corsica Technologies CISO Ross Filipek, the newly released PoC code could allow attackers to quickly weaponize their own exploits and start targeting the zero-day flaws in the wild.“Public zero-day releases always change the risk equation because they shrink the window between discovery and exploitation. In this case, YellowKey and GreenPlasma expose two different but connected concerns: access to protected data and the potential for privilege escalation. Even when an exploit has limitations, proof-of-concept code gives attackers a starting point they can test, modify, and fold into broader intrusion chains,” Filipek said.SecurityWeekhas emailed Microsoft for a statement on the zero-day exploits and will update this article if the company responds.In early April, Chaotic Eclipse published PoC exploit code targeting BlueHammer, a Windows Defender security defect patched by Microsoft onApril Patch Tuesday. Threat actorsstarted exploitingit four days before the fixes were rolled out.Related:Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesRelated:Microsoft Patches 137 VulnerabilitiesRelated:Google Detects First AI-Generated Zero-Day ExploitRelated:Is the SOC Obsolete, and We Just Haven’t Admitted It Yet?

“The PoC will create an arbitrary memory section object in any directory object writeable by System,” Chaotic Eclipse noted, explaining that it could be used to manipulate various Windows services, including kernel-mode drivers.“Even with limitations around the current proof-of-concept, any path toward System-level privileges deserves close scrutiny. If fully exploited, that kind of escalation could allow attackers to disable protections, manipulate trusted processes, deploy malware, or use the compromised machine as a stepping stone into the broader environment,” Swimlane principal security solution architect Joshua Roback said.According to Corsica Technologies CISO Ross Filipek, the newly released PoC code could allow attackers to quickly weaponize their own exploits and start targeting the zero-day flaws in the wild.“Public zero-day releases always change the risk equation because they shrink the window between discovery and exploitation. In this case, YellowKey and GreenPlasma expose two different but connected concerns: access to protected data and the potential for privilege escalation. Even when an exploit has limitations, proof-of-concept code gives attackers a starting point they can test, modify, and fold into broader intrusion chains,” Filipek said.SecurityWeekhas emailed Microsoft for a statement on the zero-day exploits and will update this article if the company responds.In early April, Chaotic Eclipse published PoC exploit code targeting BlueHammer, a Windows Defender security defect patched by Microsoft onApril Patch Tuesday. Threat actorsstarted exploitingit four days before the fixes were rolled out.Related:Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesRelated:Microsoft Patches 137 VulnerabilitiesRelated:Google Detects First AI-Generated Zero-Day ExploitRelated:Is the SOC Obsolete, and We Just Haven’t Admitted It Yet?

“Even with limitations around the current proof-of-concept, any path toward System-level privileges deserves close scrutiny. If fully exploited, that kind of escalation could allow attackers to disable protections, manipulate trusted processes, deploy malware, or use the compromised machine as a stepping stone into the broader environment,” Swimlane principal security solution architect Joshua Roback said.According to Corsica Technologies CISO Ross Filipek, the newly released PoC code could allow attackers to quickly weaponize their own exploits and start targeting the zero-day flaws in the wild.“Public zero-day releases always change the risk equation because they shrink the window between discovery and exploitation. In this case, YellowKey and GreenPlasma expose two different but connected concerns: access to protected data and the potential for privilege escalation. Even when an exploit has limitations, proof-of-concept code gives attackers a starting point they can test, modify, and fold into broader intrusion chains,” Filipek said.SecurityWeekhas emailed Microsoft for a statement on the zero-day exploits and will update this article if the company responds.In early April, Chaotic Eclipse published PoC exploit code targeting BlueHammer, a Windows Defender security defect patched by Microsoft onApril Patch Tuesday. Threat actorsstarted exploitingit four days before the fixes were rolled out.Related:Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesRelated:Microsoft Patches 137 VulnerabilitiesRelated:Google Detects First AI-Generated Zero-Day ExploitRelated:Is the SOC Obsolete, and We Just Haven’t Admitted It Yet?

According to Corsica Technologies CISO Ross Filipek, the newly released PoC code could allow attackers to quickly weaponize their own exploits and start targeting the zero-day flaws in the wild.“Public zero-day releases always change the risk equation because they shrink the window between discovery and exploitation. In this case, YellowKey and GreenPlasma expose two different but connected concerns: access to protected data and the potential for privilege escalation. Even when an exploit has limitations, proof-of-concept code gives attackers a starting point they can test, modify, and fold into broader intrusion chains,” Filipek said.SecurityWeekhas emailed Microsoft for a statement on the zero-day exploits and will update this article if the company responds.In early April, Chaotic Eclipse published PoC exploit code targeting BlueHammer, a Windows Defender security defect patched by Microsoft onApril Patch Tuesday. Threat actorsstarted exploitingit four days before the fixes were rolled out.Related:Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesRelated:Microsoft Patches 137 VulnerabilitiesRelated:Google Detects First AI-Generated Zero-Day ExploitRelated:Is the SOC Obsolete, and We Just Haven’t Admitted It Yet?

Source: SecurityWeek