1209551
📖 Tutorial

BitLocker YellowKey Exploit: A Comprehensive Mitigation Guide

Last updated: 2026-05-21 03:48:30 Intermediate
Complete guide
Follow along with this comprehensive guide

Overview

The YellowKey vulnerability (CVE-2023-21563) allows an attacker with physical access to bypass BitLocker drive encryption by exploiting the Windows Recovery Environment (WinRE). The attack leverages the FsTx Auto Recovery Utility—a legitimate component that automatically launches during WinRE boot—to escape the locked‑down environment and gain full access to encrypted data. Microsoft has released a mitigation that prevents this utility from starting when the WinRE image loads. This guide walks you through understanding the threat, the required prerequisites, and a step‑by‑step procedure to apply the fix across your organization.

BitLocker YellowKey Exploit: A Comprehensive Mitigation Guide
Source: www.securityweek.com

Prerequisites

Before proceeding, ensure you have the following in place:

  • Windows Assessment and Deployment Kit (ADK) – Install the Windows ADK for your target Windows version (Windows 10/11 or Server 2022). The Deployment Tools component is required.
  • Administrative rights – Local administrator privileges on the system used to modify the WinRE image.
  • BitLocker recovery key – Have access to the recovery key for any test device, as you may need to temporarily disable encryption during testing.
  • Target systems – Devices running a supported Windows edition (Pro, Enterprise, Education) with BitLocker enabled and using WinRE for recovery.
  • Backup – Always back up the original WinRE image and system recovery partition before making changes.

Step‑by‑Step Mitigation Procedure

1. Identify the Current WinRE Image

Open an elevated Command Prompt or PowerShell session. Run the following command to locate the WinRE partition:

reagentc /info

Look for the Windows RE location line. It will point to a file (e.g., D:\sources\recovery\winre.wim) on the system partition or a dedicated recovery partition.

2. Mount the WinRE Image

Use the Deployment Imaging Servicing and Management (DISM) tool to mount the .wim file for editing:

mkdir C:\Mount
DISM /Mount-Image /ImageFile:"" /Index:1 /MountDir:C:\Mount

Replace <path_to_winre.wim> with the actual location from step 1.

3. Disable the FsTx Auto Recovery Utility

Inside the mounted image, navigate to the Windows\System32 directory. The utility is a binary or script that launches automatically during WinRE startup. The recommended mitigation is to rename or delete the file FsTxRecovery.exe (or the corresponding script). In an elevated command prompt:

ren C:\Mount\Windows\System32\FsTxRecovery.exe FsTxRecovery.exe.disabled

Alternative approach: If you prefer a less intrusive method, use a Group Policy or registry modification to disable the service. However, the simplest and most reliable method for WinRE images is file renaming.

4. Commit the Changes and Unmount the Image

After disabling the utility, close the image and commit the changes:

DISM /Unmount-Image /MountDir:C:\Mount /Commit

If you encounter errors, use the /Discard option to revert.

BitLocker YellowKey Exploit: A Comprehensive Mitigation Guide
Source: www.securityweek.com

5. Deploy the Updated WinRE Image

Copy the modified winre.wim back to the target devices. For a single system, you can use:

reagentc /setreimage /path:

For enterprise deployment, push the updated image via SCCM, MDT, or a scripted task. After replacement, verify the configuration:

reagentc /info

6. Test the Mitigation

Reboot the device and press the recovery key shortcut (usually F11 or Escape) during boot to enter WinRE. Confirm that the FsTx Auto Recovery Utility no longer appears and that the recovery environment functions normally (e.g., Command Prompt, Reset PC options). Perform a full BitLocker recovery cycle to ensure no side effects.

Common Mistakes

  • Not updating all recovery partitions – Devices with multiple recovery partitions (e.g., dual‑boot configurations) may have separate WinRE images. Check each partition.
  • Forgetting to sign the image – If your environment requires Secure Boot, the modified image must be re‑signed with a valid certificate. Use SignTool or leave Secure Boot disabled temporarily during testing.
  • Incorrect path or index – Mounting the wrong index (e.g., index 2 instead of 1) can corrupt the image. Always use /Index:1 for single‑image .wim files.
  • Neglecting to test recovery flows – After applying the fix, boot the device into WinRE and trigger a BitLocker recovery to ensure the recovery key is still accepted and the environment is stable.
  • Using a production system for development – Always test on a non‑critical device first. A misstep can render the recovery environment unusable.

Summary

The YellowKey exploit undermines BitLocker encryption by abusing a trusted WinRE component. Microsoft’s recommended mitigation—disabling the FsTx Auto Recovery Utility—is straightforward to implement using the Windows ADK and DISM. By following the steps above, administrators can close this vulnerability without affecting normal BitLocker functionality. Regular testing and deployment automation ensure the fix reaches all devices, maintaining the integrity of your encryption strategy.