Does anyone know if the fix was shipped already? If it not a backdoor, of course.
pajko 11 minutes ago [-]
It does not matter. Who's gonna stop them adding a new backdoor in a later Windows Update(TM) ? T this point they are not to be trusted at all.
msuser 14 hours ago [-]
How is this a backdoor if one of the steps is to reboot the system while holding down SHIFT? To boot in the first place, the drive needs to be unlocked.
anonymars 15 minutes ago [-]
If you have physical access to plug in a flash drive, why would you need the drive unlocked to reboot into the recovery environment? Just power it off and trigger the boot options
e12e 3 hours ago [-]
In addition to sibling comments, the author claims it also affects tpm+pin.
fh67 13 hours ago [-]
Most users have it unlocked by TPM only as that is the default Microsoft configuration - you then reboot into windows recovery, yes if windows recovery is disabled or if bitlocker requires a startup pin then this is mitigated.
pajko 14 minutes ago [-]
"No, TPM+PIN does not help, the issue is still exploitable regardless, I asked myself this question, can it still work in a TPM+PIN environment ? Yes it does, I'm just not publishing the PoC, I think what's out there is already bad enough."
Point taken, but I would call this an authentication bypass (i.e. you can become administrator without any credentials) instead of a BitLocker bypass. It looks like at most, having BitLocker turned on is a requirement to trigger the bug/backdoor.
In any case I'd be very curious to read a response to these findings from someone at Microsoft.
https://infosec.exchange/@wdormann/116565129854382214
https://deadeclipse666.blogspot.com/2026/05/were-doing-silen...
In any case I'd be very curious to read a response to these findings from someone at Microsoft.