Overview A newly disclosed tool called BitUnlocker demonstrates a practical downgrade attack against Microsoft’s BitLocker encryption. By exploiting a gap between patching and certificate revocation, attackers with physical access can decrypt protected volumes on patched Windows 11 machines in under five minutes.
Root Cause: CVE‑2025‑48804
- Discovered by Microsoft’s STORM team, patched in July 2025.
- Vulnerability lies in the Windows Recovery Environment (WinRE) and the System Deployment Image (SDI) mechanism.
- Attackers can append a malicious WIM file to the SDI blob table.
- Boot manager verifies the legitimate WIM but boots from the attacker’s WIM, launching a modified WinRE image with BitLocker volumes already decrypted.
Why the Patch Isn’t Enough
- Microsoft patched
bootmgfw.efibinaries, but Secure Boot validates certificates, not version numbers. - The legacy Microsoft Windows PCA 2011 certificate remains trusted in most Secure Boot databases.
- As a result, pre‑patch boot managers signed under PCA 2011 still pass validation.
- Revoking PCA 2011 is operationally difficult, as it would affect many legitimate binaries.
Attack Flow
- Attacker prepares a tampered Boot Configuration Data (BCD) file.
- Serves a vulnerable PCA 2011‑signed boot manager via USB or PXE boot.
- Target machine loads the pre‑patch boot manager, which passes Secure Boot.
- TPM releases the BitLocker Volume Master Key (VMK) without alerts.
- A command prompt opens with the OS volume fully decrypted and mounted.
Vulnerable Systems:
- TPM‑only BitLocker (no PIN).
- Secure Boot databases still trusting PCA 2011.
Protected Systems:
- TPM + PIN configurations.
- Systems migrated via KB5025885 to the newer Windows UEFI CA 2023 certificate.
Mitigation Steps
- Enable TPM + PIN pre‑boot authentication → prevents TPM from releasing VMK during manipulated boot.
- Deploy KB5025885 → migrates boot manager signing to CA 2023 and introduces revocation controls.
- Verify boot manager certificate → use
sigcheckto confirmbootmgfw.efiis signed under CA 2023. - Remove WinRE recovery partition on high‑security workloads where pre‑boot authentication cannot be enforced.
Final Thought
The BitUnlocker downgrade attack highlights the fragility of relying solely on patches without certificate revocation. With a working proof‑of‑concept now public, enterprises must audit BitLocker configurations and accelerate migration to CA 2023 to avoid opportunistic exploitation.
Leave a Reply