BitLocker YellowKey Exploit: A Comprehensive Mitigation Guide
Overview
The YellowKey vulnerability (CVE-2023-21563) allows an attacker with physical access to bypass BitLocker drive encryption by exploiting the Windows Recovery Environment (WinRE). The attack leverages the FsTx Auto Recovery Utility—a legitimate component that automatically launches during WinRE boot—to escape the locked‑down environment and gain full access to encrypted data. Microsoft has released a mitigation that prevents this utility from starting when the WinRE image loads. This guide walks you through understanding the threat, the required prerequisites, and a step‑by‑step procedure to apply the fix across your organization.

Prerequisites
Before proceeding, ensure you have the following in place:
- Windows Assessment and Deployment Kit (ADK) – Install the Windows ADK for your target Windows version (Windows 10/11 or Server 2022). The Deployment Tools component is required.
- Administrative rights – Local administrator privileges on the system used to modify the WinRE image.
- BitLocker recovery key – Have access to the recovery key for any test device, as you may need to temporarily disable encryption during testing.
- Target systems – Devices running a supported Windows edition (Pro, Enterprise, Education) with BitLocker enabled and using WinRE for recovery.
- Backup – Always back up the original WinRE image and system recovery partition before making changes.
Step‑by‑Step Mitigation Procedure
1. Identify the Current WinRE Image
Open an elevated Command Prompt or PowerShell session. Run the following command to locate the WinRE partition:
reagentc /info
Look for the Windows RE location line. It will point to a file (e.g., D:\sources\recovery\winre.wim) on the system partition or a dedicated recovery partition.
2. Mount the WinRE Image
Use the Deployment Imaging Servicing and Management (DISM) tool to mount the .wim file for editing:
mkdir C:\Mount
DISM /Mount-Image /ImageFile:"" /Index:1 /MountDir:C:\Mount
Replace <path_to_winre.wim> with the actual location from step 1.
3. Disable the FsTx Auto Recovery Utility
Inside the mounted image, navigate to the Windows\System32 directory. The utility is a binary or script that launches automatically during WinRE startup. The recommended mitigation is to rename or delete the file FsTxRecovery.exe (or the corresponding script). In an elevated command prompt:
ren C:\Mount\Windows\System32\FsTxRecovery.exe FsTxRecovery.exe.disabled
Alternative approach: If you prefer a less intrusive method, use a Group Policy or registry modification to disable the service. However, the simplest and most reliable method for WinRE images is file renaming.
4. Commit the Changes and Unmount the Image
After disabling the utility, close the image and commit the changes:
DISM /Unmount-Image /MountDir:C:\Mount /Commit
If you encounter errors, use the /Discard option to revert.

5. Deploy the Updated WinRE Image
Copy the modified winre.wim back to the target devices. For a single system, you can use:
reagentc /setreimage /path:
For enterprise deployment, push the updated image via SCCM, MDT, or a scripted task. After replacement, verify the configuration:
reagentc /info
6. Test the Mitigation
Reboot the device and press the recovery key shortcut (usually F11 or Escape) during boot to enter WinRE. Confirm that the FsTx Auto Recovery Utility no longer appears and that the recovery environment functions normally (e.g., Command Prompt, Reset PC options). Perform a full BitLocker recovery cycle to ensure no side effects.
Common Mistakes
- Not updating all recovery partitions – Devices with multiple recovery partitions (e.g., dual‑boot configurations) may have separate WinRE images. Check each partition.
- Forgetting to sign the image – If your environment requires Secure Boot, the modified image must be re‑signed with a valid certificate. Use
SignToolor leave Secure Boot disabled temporarily during testing. - Incorrect path or index – Mounting the wrong index (e.g., index 2 instead of 1) can corrupt the image. Always use
/Index:1for single‑image .wim files. - Neglecting to test recovery flows – After applying the fix, boot the device into WinRE and trigger a BitLocker recovery to ensure the recovery key is still accepted and the environment is stable.
- Using a production system for development – Always test on a non‑critical device first. A misstep can render the recovery environment unusable.
Summary
The YellowKey exploit undermines BitLocker encryption by abusing a trusted WinRE component. Microsoft’s recommended mitigation—disabling the FsTx Auto Recovery Utility—is straightforward to implement using the Windows ADK and DISM. By following the steps above, administrators can close this vulnerability without affecting normal BitLocker functionality. Regular testing and deployment automation ensure the fix reaches all devices, maintaining the integrity of your encryption strategy.
Related Articles
- Linux Kernel Flaws Spark Debate Over Emergency 'Kill Switch' Mechanism
- YellowKey Exploit Exposes BitLocker Weakness: Unlocking Encrypted Drives with a USB Stick
- Critical Exchange Server Flaw Under Active Attack: Microsoft Warns of CVE-2026-42897 Spoofing Bug
- Securing Windows Access: A Step-by-Step Guide to Using Boundary and Vault for Credential Management
- The Resurgence of MSHTA: A Legacy Tool Powering Modern Stealth Malware
- Unmasking UAT-8302: China-Aligned APT Group’s Cross-Continental Government Espionage
- Cyberattack on Canvas During Finals: Key Questions Answered
- NIST Drastically Scales Back Vulnerability Database Enrichments: Urgent Implications for Container Security