Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2185 articles · 154680 vulns · 36/41 feeds (7d)
← Back to list
6.8
CVE-2026-45585EXPLOITEDPATCHED
microsoft · windows 11 version 24h2

Windows BitLocker Security Feature Bypass Vulnerability

Description

Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as "YellowKey". The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices. We are issuing this CVE to provide mitigation guidance that can be implemented to protect against this vulnerability until the security update is made available.

Affected Products

VendorProductVersions
microsoftwindows 11 version 24h2-, -, -, -, -

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
microsoftmicrosoft windowscert_advisory90%

References

  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45585(vendor-advisory, patch)

Related News (8 articles)

Tier D
SecurityWeek3h ago
Microsoft Rolls Out Mitigations for ‘YellowKey’ BitLocker Bypass
→ No new info (linked only)
Tier B
BSI Advisories8h ago
[NEU] [mittel] Microsoft Windows 11 und Windows Server 2025: Schwachstelle ermöglicht Umgehen der Laufwerksverschlüsselung
→ No new info (linked only)
Tier D
Help Net Security10h ago
Microsoft provides mitigation for “YellowKey” BitLocker bypass flaw (CVE-2026-45585)
→ No new info (linked only)
Tier D
The Hacker News11h ago
Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit
→ No new info (linked only)
Tier D
BleepingComputer11h ago
Microsoft shares mitigation for YellowKey Windows zero-day
→ No new info (linked only)
Tier C
VulDB15h ago
CVE-2026-45585 | Microsoft Windows 11 24H2/11 25H2/11 26H1/Server 2025 YellowKey command injection
→ No new info (linked only)
Tier B
CERT-FR19h ago
Multiples vulnérabilités dans Microsoft Windows (20 mai 2026)
→ No new info (linked only)
Tier A
Microsoft MSRC1d ago
CVE-2026-45585 Windows BitLocker Security Feature Bypass Vulnerability
→ No new info (linked only)
CVSS 3.16.8 MEDIUM
VectorCVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:C
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45585
CWECWE-77
PublishedMay 19, 2026
Last enriched5h agov6
Tags
elevation of privilegesecurity policy bypassmultiple vulnerabilities
Trending Score87
Source articles8
Independent8
Info Completeness11/14
Missing: epss, kev, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-33825EXPKEV
Microsoft Defender Elevation of Privilege Vulnerability
Trending: 148
HIGHCVE-2026-41091EXPKEV
Microsoft Defender Elevation of Privilege Vulnerability
Trending: 128
HIGHCVE-2026-42897EXPKEV
Microsoft Exchange Server Spoofing Vulnerability
Trending: 122
MEDIUMCVE-2026-45498EXPKEV
Microsoft Defender Denial of Service Vulnerability
Trending: 105
HIGHCVE-2026-25187EXPKEV
Winlogon Elevation of Privilege Vulnerability
Trending: 96

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
May 19, 2026
Discovered by ZDM
May 20, 2026
Updated: severity, affectedVersions, exploitAvailable, activelyExploited
May 20, 2026
Updated: iocs
May 20, 2026
Updated: description
May 20, 2026
Updated: affectedVersions, severity, cweIds, tags
May 20, 2026
Updated: tags
May 20, 2026
Actively Exploited
May 20, 2026
Exploit Available
May 20, 2026
Patch Available
May 20, 2026

Version History

v6
Last enriched 5h ago
v6Tier B5h ago

Added a new tag 'multiple vulnerabilities' and updated patch availability to null.

tags
via CERT-FR
v5Tier B5h ago

Updated affected versions to include Windows 11 Version 25H2 and 26H1, changed severity to HIGH, added new CWE-274, and included new tags related to the vulnerability.

affectedVersionsseveritycweIdstags
via CERT-FR
v4Tier D10h ago

Updated description with more technical detail and clarified that the patch is not yet available.

description
via Help Net Security
v3Tier D11h ago

Updated description with technical details on exploitation and mitigations, added affected versions, and clarified patch availability.

iocs
via BleepingComputer
v2Tier C15h ago

Updated severity to CRITICAL, added affected versions 11 25H2 and 11 26H1, marked exploit as available, and noted that the vulnerability is actively exploited.

severityaffectedVersionsexploitAvailableactivelyExploited
via VulDB
v118h ago

Initial creation