Windows 11's BitLocker can be cracked just by using Secure Boot
The BitLocker vulnerability is a lot more serious than we believed
2 min. read
Published on
Read our disclosure page to find out how can you help Windows Report sustain the editorial team. Read more
Microsoft is aware of the CVE-2023-21563 vulnerability or the BitLocker Security Feature Bypass Vulnerability (as it’s officially called) from 2022, but it wasn’t addressed yet. However, the problem is very serious because recently, a hacker named Thomas Lamberts found a very simple way to exploit it using Secure Boot and published his methods on the Chaos Computer Club blog (CCC) as proof.
How does the BitLocker exploit work?
If you don’t know, BitLocker is a volume encryption tool introduced by Microsoft in the Vista era to secure the data by using encryption algorithms AES and other methods. However, it seems that it can be broken down by using a Windows bootable USB and a little bit of patience.
Lambertz used the Secure Boot tool to load an outdated Windows bootloader and disable BitLocker, thus gaining access to all the secure volume data on a Windows 11 PC which was fully updated.
Long story short, the attacker managed to enter into the system just by booting Windows from the device, which is mind boggling.
In 2023, we also reported about users missing Device Encryption just because Secure Boot was not enabled and this problem is also connected to this CVE.
We don’t know why Microsoft has been waiting so long to address this problem. Maybe because the hacker needs physical access to the PC. Lambertz’s supposition is how law enforcement gain access to encrypted devices.
As a consumer, it’s hardly a problem because the technique is highly impractical for an attacker, but an organization with a widely-spread network, this issue becomes a real security issue. Gaining access to one terminal may mean compromising the entire network which can be very concerning.
Of course, we will keep you updated on the developments on this matter. We’ve learned about this from TechSpot.
You can comment on this subject in the dedicated section below.
User forum
0 messages