Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

A hacker explains that a supposedly patched Windows 11 BitLocker is still vulnerable to hacking – and default encryption can be overcome with network access



This week at the Chaos Computer Club’s (CCC) annual Chaos Communication Conference, hacker Thomas Lambertz presented “Windows BitLocker: Installed without a screwdriver“,” details how users can circumvent BitLocker encryption and access protected data. The old reported bug has been fixed, CVE-2023-21563it can still be exploited in current versions of Windows with only one-time physical access to the device and a network connection. However, the attack does not require unlocking the computer or gaining hours of access as with other drive decryption exploits (h/t Haze).

This attack falls within the category of “bitpixie” attacks that have been well documented since mid-2022. While this specific bug Technically It was fixed via updates in November 2022, which shows that this fix is, unfortunately, only at the surface level. Using Secure Boot to start an old Windows bootloader to extract the encryption key into memory and then using Linux to retrieve the contents of the memory and find the BitLocker key, the updated version of Windows 11 It can still be attacked effectively as if it had never been updated to handle bitpixie attacks at all.

Leave a Reply

Your email address will not be published. Required fields are marked *