Tech 9 min read

YellowKey BitLocker bypass via WinRE opens encrypted drives with a USB stick, GreenPlasma CTFMON LPE drops the same day, Chaotic Eclipse calls it a backdoor

IkesanContents

One day after May Patch Tuesday, on May 13, 2026, the same researcher who shipped BlueHammer in April — Chaotic Eclipse (GitHub handle: Nightmare-Eclipse) — dropped two more unpatched Windows zero-days at once. One is YellowKey, a BitLocker bypass that opens encrypted drives with a single USB stick. The other is GreenPlasma, a CTFMON-based attempt at SYSTEM elevation. Both ship with working PoCs and neither has a CVE.

The researcher himself writes that YellowKey “can’t be explained as anything other than a backdoor.” The reasoning is that the component responsible for the bypass exists only inside the WinRE (Windows Recovery Environment) image — a component with the exact same name ships in normal Windows installation images, but the bypass behavior does not appear there.

TL;DR

Impact Windows 11 / Windows Server 2022 / 2025 (Windows 10 is not affected)

Disclosed 2026-05-13, one day after May Patch Tuesday

Status Unpatched, no CVE assigned, no official mitigation

Requirements Physical access, a USB drive (NTFS / FAT32 / exFAT), holding Ctrl during reboot

Result Read/write access to BitLocker-protected drives from a cmd.exe shell

Companion drop GreenPlasma, a CTFMON-based SYSTEM elevation attempt (PoC incomplete)

Background Same researcher behind April’s BlueHammer / RedSun / UnDefend Defender chain. Claims Microsoft “silently patched” RedSun without issuing a CVE

Coming A “big surprise” teased for the June Patch Tuesday cycle

Timeline: from BlueHammer to YellowKey

WhenWhat
2026-04-15Microsoft patches BlueHammer (Windows Defender LPE / CVE-2026-33825) in April Patch Tuesday; researcher publishes a full PoC
AprilChaotic Eclipse drops three Defender-related issues — BlueHammer, RedSun, UnDefend — in succession
Early MayRedSun is quietly fixed. No advisory, no CVE. The researcher publishes a blog post questioning whether this counts as a silent patch
2026-05-12Microsoft May Patch Tuesday
2026-05-13YellowKey (BitLocker bypass) and GreenPlasma (CTFMON LPE) released on GitHub
2026-06?”Big surprise” teased

Silently patching a reported vulnerability without a CVE is not unusual on its own, but it leaves the external reporter unable to tell whether their report was received or whether credit was deliberately dropped. This release sequence is the visible side of that frustration, and several outlets are reporting it that way.

YellowKey: how the BitLocker bypass works

ItemDetail
ClassBitLocker full-volume encryption bypass
PathWinRE (Windows Recovery Environment) + NTFS Transactions
NeededUSB drive (NTFS / FAT32 / exFAT), physical access, the Ctrl key
ImpactWindows 11 / Server 2022 / 2025 (Windows 10 out of scope)
AuthNone — operates from before BitLocker unlock
CVENone
PatchNone

The important thing is that YellowKey is not a cryptographic break of BitLocker. It rewinds the WinRE boot path so that a recovery-environment shell (cmd.exe) is dropped in front of the user, and from there the volumes that the OS has already mounted with their decryption keys are reachable from that shell.

Attack chain

flowchart TD
    A[Attacker] --> B[Prepare USB drive<br/>NTFS or FAT32 or exFAT]
    B --> C["Place crafted NTFS transaction logs<br/>under System Volume Information\FsTx\"]
    C --> D[Insert USB into target PC<br/>BitLocker enabled]
    D --> E[Reboot while holding Ctrl]
    E --> F[WinRE starts]
    F --> G[Windows enumerates FsTx on attached drives<br/>and replays the NTFS logs]
    G --> H["X:\Windows\System32\winpeshl.ini gets deleted"]
    H --> I[WinRE falls back to cmd.exe<br/>instead of its real startup shell]
    I --> J[Read and write the BitLocker-protected drive<br/>from the shell]

Cross-referencing the YellowKey README (Nightmare-Eclipse/YellowKey) with analyses from Hive Security, Blackfort Technology and Bleeping Computer, the trick comes down to three points.

  • NTFS Transactions replay: Windows automatically replays NTFS transaction logs (metadata operations rooted in $Logfile) from volumes attached during the boot path
  • FsTx directory scan: The trigger is the \System Volume Information\FsTx\ directory on each volume. Crafted logs placed on the USB side get replayed as changes against WinRE’s internal X: volume
  • winpeshl.ini deletion: As a result of replay, X:\Windows\System32\winpeshl.ini is missing when WinRE comes up. That file defines what WinRE launches first; without it, cmd.exe is the fallback

Holding Ctrl is the side route into WinRE rather than a normal boot, and the same conditions can be reproduced via the Shift+restart recovery flow. The exploit requires physical access and a USB stick — no firmware password, no PIN, no pre-boot authentication (PBA) is touched.

Why people are calling it a backdoor

The researcher’s argument: a component with the same name exists in normal Windows installation images, but the FsTx replay path observed in live WinRE behavior does not fire there. If this were a coincidental bug, the same behavior should show up on the install-image side too.

Whether you read that as “intentional backdoor” or not, the layout is hard to write off as a random misconfiguration:

  • WinRE is a signed part of Windows shipped by Microsoft — not an OSS recovery environment users can build themselves
  • Only the WinRE flavor of that component rewinds the transaction log of an external volume into its own internal state
  • The file that is removed by replay is the “what runs first” config, and the fallback happens to be cmd.exe

As of 2026-05-18, Microsoft has not publicly explained this as a coincidence or a design side effect.

GreenPlasma: SYSTEM elevation via CTFMON

The other zero-day published alongside YellowKey is GreenPlasma, a local privilege escalation (LPE — going from a regular user to SYSTEM).

ItemDetail
ClassLocal privilege escalation (LPE)
Targetctfmon.exe (Text Input Service, runs as SYSTEM)
Description”Windows CTFMON Arbitrary Section Creation Elevation of Privileges Vulnerability”
ImpactWindows 11 / Server 2022 / 2026
PoCIncomplete — reaches memory section creation, not a full SYSTEM shell
CVENone
PatchNone

CTFMON (ctfmon.exe) runs as SYSTEM in every interactive logon session and handles the text-input framework around IMEs and the language bar. The PoC exploits the fact that an unprivileged user can create arbitrary memory section objects inside object directories where SYSTEM has write permission.

Memory sections are the substrate for shared memory between processes, and dropping one into a SYSTEM-owned path means that any service or driver implicitly trusting that path will execute against attacker-controlled content. Bleeping Computer and The Hacker News both summarize this as “manipulation of privileged services or drivers that implicitly trust those paths.”

The researcher is explicit that the PoC is incomplete — this is not a finished tool ready to be wrapped into commodity malware. But ctfmon is alive in every RDP and interactive session, so once the chain is finished, it becomes a direct SYSTEM acquisition path during post-exploitation.

Impact and how to weigh the risk

AspectYellowKeyGreenPlasma
PrerequisitePhysical access + USBExisting local code execution
PrivilegeNone — operates from the lock screenUnprivileged user
MaturityWorking (USB copy → Ctrl+reboot)PoC incomplete (no SYSTEM shell yet)
PatchNoneNone
MitigationRestrict physical access / TPM+PIN / stronger pre-boot authNone published yet

YellowKey weighs heaviest where the threat model already includes “stolen laptop / lost laptop / device confiscated for inspection.” BitLocker is commonly treated as the default defense against powered-off physical theft, and TPM-only or Windows Hello PIN-centric configurations satisfy YellowKey’s preconditions as-is.

Configurations that significantly reduce YellowKey’s real-world damage:

ConfigurationWhy it helps
TPM + PIN (pre-boot authentication)A PIN is required before WinRE is reachable
Third-party pre-boot authenticationAuthentication happens at the BIOS/UEFI stage
BitLocker recovery key escrow + rotationThe fact that the drive was opened once becomes detectable

If your threat model does not include physical access to begin with, YellowKey is less of an “act today” item and more of a “tighten PIN policies and WinRE access while waiting for the official patch” item.

GreenPlasma is downstream of an existing foothold — it only matters once an attacker is already running code locally, paired with an initial-access vector (phishing, supply chain compromise, another RCE). The detection question is whether EDR/AV telemetry can catch unusual writes around \BaseNamedObjects or the object directories CTFMON touches.

RedSun silent patch and the researcher’s motive

This double drop sits on top of an ongoing RedSun silent-patch dispute that has been running since April.

  • The researcher’s claim: he reported RedSun (a Windows Defender issue), Microsoft fixed it in May Windows Update without an advisory or a CVE
  • He stated on his blog (deadeclipse666) that if Microsoft is going to do silent patches, he will release without advance notice too
  • A “big surprise” is teased for June Patch Tuesday

A vendor closing a reported vulnerability without a CVE assignment is not rare, but quietly closing it when an external reporter is named on the report leaves the reporter unable to tell whether their submission was acknowledged or whether they were edited out of the credit line. That frustration is now leaving as a chain of public zero-days.

This is a different layer from the technical content of any single vulnerability. It’s a case study of what happens when the Coordinated Vulnerability Disclosure (CVD) workflow breaks down in public.

What defenders can do right now

Working from the assumption that no patch is coming this cycle, the realistic moves:

AreaConcrete action
WinRE access controlRe-review recovery environment policy on managed PCs, including reagentc /disable. Check whether an extra auth step can gate reaching recovery mode at all
Move BitLocker to TPM+PINTPM-only and “boot without keyboard interaction” setups are exactly the target. If you want to defend devices that were suspended/locked when lost, make PIN mandatory
Re-check physical securityLockers, bags in transit, repair vendor handling. Replace the assumption “BitLocker crypto protects this” with “a powered-off laptop opens with one USB stick”
Detection sideCheck whether EDR catches the cmd.exe surface after WinRE start, the diff against X:\Windows\System32\winpeshl.ini, and unusual writes to object directories CTFMON touches
Patch Tuesday watchAt June Patch Tuesday (planned 2026-06-09), watch how YellowKey / GreenPlasma / the teased “big surprise” are handled — CVE assigned, silent patch, or further disclosure from Chaotic Eclipse

The unhealthy part of this story is not BitLocker itself, but that an upset researcher can push a chain of zero-days out into the open. How Microsoft handles incoming reports is what I keep coming back to here.