Researcher Drops YellowKey, GreenPlasma Windows Zero-Days
Two zero-day vulnerabilities affecting Windows 11 were publicly disclosed by a security researcher. YellowKey is a BitLocker bypass exploit requiring physical access, allowing attackers to access encrypted storage volumes by leveraging a component present only in the Windows Recovery Environment. GreenPlasma is a privilege escalation vulnerability enabling attackers to elevate privileges to System level. Both exploits have publicly available proof-of-concept code, though GreenPlasma's PoC is limited and does not provide a full System shell. These vulnerabilities have been confirmed to work on recent Windows 11 builds. No official patch or vendor advisory has been provided yet.
AI Analysis
Technical Summary
The disclosed vulnerabilities include YellowKey, which bypasses BitLocker encryption by exploiting a hidden component in the Windows Recovery Environment (WinRE). This exploit requires physical access and involves rebooting into WinRE and triggering a command prompt that grants access to the protected volume. YellowKey also reportedly works against devices protected with a TPM PIN, though success depends on WinRE implementation. The second vulnerability, GreenPlasma, allows arbitrary memory section creation in directories writable by System, potentially enabling privilege escalation to System level. The researcher released proof-of-concept code for both exploits, with GreenPlasma's PoC missing full System shell capabilities. These vulnerabilities affect Windows 11 and have been independently verified by multiple security researchers.
Potential Impact
YellowKey enables attackers with physical access to bypass BitLocker encryption, potentially exposing protected data on encrypted drives. This undermines the security guarantees of BitLocker, including those relying on TPM hardware. GreenPlasma allows attackers to escalate privileges to System level, which could enable disabling security protections, manipulating trusted processes, deploying malware, or lateral movement within an environment. The public release of proof-of-concept code increases the risk of these vulnerabilities being weaponized. There are no known exploits in the wild at the time of disclosure.
Mitigation Recommendations
No official patch or remediation guidance from Microsoft is available at this time. Organizations should monitor for updates from Microsoft and apply patches promptly once released. Given that YellowKey requires physical access, physical security controls remain important. Until a fix is available, restricting physical access to devices and using additional security layers may reduce risk. The vendor advisory status is unknown; check Microsoft’s official channels for current remediation guidance.
Researcher Drops YellowKey, GreenPlasma Windows Zero-Days
Description
Two zero-day vulnerabilities affecting Windows 11 were publicly disclosed by a security researcher. YellowKey is a BitLocker bypass exploit requiring physical access, allowing attackers to access encrypted storage volumes by leveraging a component present only in the Windows Recovery Environment. GreenPlasma is a privilege escalation vulnerability enabling attackers to elevate privileges to System level. Both exploits have publicly available proof-of-concept code, though GreenPlasma's PoC is limited and does not provide a full System shell. These vulnerabilities have been confirmed to work on recent Windows 11 builds. No official patch or vendor advisory has been provided yet.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The disclosed vulnerabilities include YellowKey, which bypasses BitLocker encryption by exploiting a hidden component in the Windows Recovery Environment (WinRE). This exploit requires physical access and involves rebooting into WinRE and triggering a command prompt that grants access to the protected volume. YellowKey also reportedly works against devices protected with a TPM PIN, though success depends on WinRE implementation. The second vulnerability, GreenPlasma, allows arbitrary memory section creation in directories writable by System, potentially enabling privilege escalation to System level. The researcher released proof-of-concept code for both exploits, with GreenPlasma's PoC missing full System shell capabilities. These vulnerabilities affect Windows 11 and have been independently verified by multiple security researchers.
Potential Impact
YellowKey enables attackers with physical access to bypass BitLocker encryption, potentially exposing protected data on encrypted drives. This undermines the security guarantees of BitLocker, including those relying on TPM hardware. GreenPlasma allows attackers to escalate privileges to System level, which could enable disabling security protections, manipulating trusted processes, deploying malware, or lateral movement within an environment. The public release of proof-of-concept code increases the risk of these vulnerabilities being weaponized. There are no known exploits in the wild at the time of disclosure.
Mitigation Recommendations
No official patch or remediation guidance from Microsoft is available at this time. Organizations should monitor for updates from Microsoft and apply patches promptly once released. Given that YellowKey requires physical access, physical security controls remain important. Until a fix is available, restricting physical access to devices and using additional security layers may reduce risk. The vendor advisory status is unknown; check Microsoft’s official channels for current remediation guidance.
Technical Details
- Article Source
- {"url":"https://www.securityweek.com/researcher-drops-yellowkey-greenplasma-windows-zero-days/","fetched":true,"fetchedAt":"2026-05-14T07:36:22.645Z","wordCount":1343}
Threat ID: 6a057b76cbff5d8610add7cf
Added to database: 5/14/2026, 7:36:22 AM
Last enriched: 5/14/2026, 7:36:30 AM
Last updated: 5/14/2026, 7:36:35 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.