Remediating CVE-2024-20666 - BitLocker Security Feature Bypass Vulnerability (2024)

Microsoft have recently announced CVE-2024-20666 for BitLocker Device Encryption. As we start to understand the severity of the CVE and unpick the guidance from Microsoft, I am hoping to document what I understand and have learnt so far.

Last Updated: 09/02/2024.

Information:

CVE ID: CVE-2024-20666

CVE Severity: Medium

CVSS Base Score: 6.6

CVE Description: A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.

Products Affected: ["Systems with Bitlocker enabled, Windows 10, Windows 11"]

Exploit Publicly Disclosed: No

Exploit Publicly Available: No

Assumptions:

This article assumes:

  • You are running Windows 10, version 2004 or later.
  • The WinRE (recovery partition) has 250 MB of free space.
  • You have admin rights on the machine.

Disclaimer:

The information on CVE-2024-20666 provided here is based on my research as of February 8, 2024, and is shared for informational purposes only. While I aim to offer helpful insights, I make no guarantees about the accuracy or completeness of this information. Users should consult official Microsoft documentation for guidance and verify any suggested remediation steps against their specific system configurations. This post is independent of Microsoft and is not endorsed by them. Use the information at your own risk.

Remediation:

  1. Install patch for Microsoft Windows 10 19045 (Workstation): Security Update KB5034122
  2. Complete these remediation steps provided in the vendor advisories.

NOTE: The script in remediation step #2.2 is from 2022 and references older version numbers - e.g. ($fileRevision -ge 2247). Whilst this script will work for WinRE environments that have never been updated, the latest WinRE update does not update this file so an alternative detection method should be used if WinRE has been patched for CVE-2022-41099, to ensure WinRE.wim is at ServicePack Build >=3920.

If you would like an example of an updated detection method, please see the end of this article.

Single Line PowerShell Command to check the current Windows RE Service Pack Build Version Number:

Thanks & credit to Jordan Mc Connell for the below single line PS:

& { $WinReLocation=((reagentc /info | Select-String " Windows RE Location:").Line -replace "Windows RE Location:\s+", "").trim(); $WinReBuild = ((dism /get-imageinfo /ImageFile:$WinReLocation\winre.wim /index:1 | Select-String "ServicePack Build :")); $WinReBuild} 

Recommended by LinkedIn

Windows "Hello" and Security another love story with… Dominique Brack 9 years ago
Microsoft warns of new PrintNightmare vulnerability… Aparna Agarwal, CISM 1 year ago

Detailed Method to check the current Windows RE Service Pack Build Version Number:

Invoking "reagentc /info" will give you the path of the WinRE Environment.

EXAMPLE:C:\WINDOWS\system32>reagentc /infoWindows Recovery Environment (Windows RE) and system reset configurationInformation: Windows RE status: Enabled Windows RE location: \\?\GLOBALROOT\device\harddisk0\partition4\Recovery\WindowsRE<redacted> 

This path can then be used with the DISM command below to determine the version numbers of the WinRE environment.

DISM /Get-ImageInfo /ImageFile:<windows_re_location>\winre.wim /index:1EXAMPLE:DISM /Get-ImageInfo /ImageFile:\\?\GLOBALROOT\device\harddisk0\partition4\Recovery\WindowsRE\winre.wim /index:1 
Remediating CVE-2024-20666 - BitLocker Security Feature Bypass Vulnerability (4)

Updating WinRE to Remediate CVE-2024-20666:

Invoke the script to update the WinRE environment.

.\PatchWinREScript_2004plus -packagePath <path_to_kb5034232.cab> 

Example:

.\PatchWinREScript_2004plus -packagePath "C:\users\*\Desktop\windows10.0-kb5034232-x64_ff4651e9e031bad04f7fa645dc3dee1fe1435f38.cab" 
Remediating CVE-2024-20666 - BitLocker Security Feature Bypass Vulnerability (5)

Use the same command from earlier OR the single line PowerShell command to check the current Windows RE Service Pack Build Version Number:

# Single Line PowerShell Command (Kudos JM):& { $WinReLocation=((reagentc /info | Select-String " Windows RE Location:").Line -replace "Windows RE Location:\s+", "").trim(); $WinReBuild = ((dism /get-imageinfo /ImageFile:$WinReLocation\winre.wim /index:1 | Select-String "ServicePack Build :")); $WinReBuild} 
# Detailed Method:DISM /Get-ImageInfo /ImageFile:<windows_re_location>\winre.wim /index:1EXAMPLE:DISM /Get-ImageInfo /ImageFile:\\?\GLOBALROOT\device\harddisk0\partition4\Recovery\WindowsRE\winre.wim /index:1 
Remediating CVE-2024-20666 - BitLocker Security Feature Bypass Vulnerability (6)

Updated Detection Method for PatchWinREScript_2004plus.ps1

Replace the following sections of code:

Line #215: Change $targetBinary to look at "winload.exe", which has actually been updated in KB5034232.

$targetBinary=$mountDir + "\Windows\System32\winload.exe" #KB5034232 

Line #313-317: Change $fileRevision to >= new "winload.exe" version.

if ($fileRevision -ge 3920) #KB5034232{LogMessage("Windows 10, version 2004 with revision " + $fileRevision + " >= 3920, updates have been applied") 

Please note the below has not been tested but file versions for older Windows 10 versions appear to be:

#Windows 10, version 1507 10240.20400 #KB5034233#Windows 10, version 1607 14393.6610 #KB5034230#Windows 10, version 1809 17763.5322 #KB5034231#Windows 10, version 2004 1904X.3920 #KB5034232 

These can be updated in the same manner as above for each respective Windows version within the script.

Remediating CVE-2024-20666 - BitLocker Security Feature Bypass Vulnerability (2024)

FAQs

What is CVE 2024 20666? ›

We are aware of a Microsoft issue that concerns the recent OS update KB5034441 for Windows Recovery Environment (WinRE). This important update addresses a security vulnerability identified as CVE-2024-20666, which could potentially allow attackers to bypass BitLocker encryption by exploiting WinRE.

What is security bypass vulnerability? ›

An authentication bypass vulnerability is a weak point in the user authentication process. A cybercriminal exploiting such a weakness circumvents authentication altogether to gain access to an application, service, or device.

What is the BitLocker security flaw? ›

Tracked as CVE-2024-38058, this important severity security flaw can let attackers bypass the BitLocker Device Encryption feature and access encrypted data with physical access to the targeted device.

Which security feature bypass vulnerability exists in the way Microsoft asp net core parses encoded cookie names? ›

A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.

What would trigger BitLocker? ›

Bitlocker recovery mode can be triggered by a number of situations, including: A malicious attempt by a person or software to change the startup environment. Rootkits are one example. Moving the BitLocker-protected drive into a new computer.

What is a cookie a computer virus a file that makes it easier to access a web site and browser web application file a file that hackers use to steal your identity? ›

Cookies (often known as internet cookies) are text files with small pieces of data — like a username and password — that are used to identify your computer as you use a network.

What is cookie vulnerability? ›

Cookies (or other session tokens) not generated or transmitted securely are vulnerable to hijacking or poisoning. Cross-site scripting (XSS) is a common way to steal cookies, but a number of methods, including packet sniffing and brute force, may be used to gain unauthorized access to cookies.

What is cookie theft in network security? ›

Examples of cookie theft

Cross-site scripting (XSS) is a cyberattack where a hacker injects malicious code into a vulnerable website. After a user visits this website and a cookie is created, a hacker can use the cookie to impersonate the user and perform actions on the victim's behalf.

What are the weaknesses of BitLocker? ›

The recovery process can be cumbersome when users forget their BitLocker password or encounter a hardware failure. Recovering encrypted data often involves using a recovery key, which, if not stored securely, could lead to unauthorized access.

What is the downside to BitLocker? ›

Cons of BitLocker

Not having the key can lock legitimate users out of their own data and using BitLocker can significantly impact performance (up to 45%) in some cases.

What is BitLocker and its issues? ›

BitLocker enables users to encrypt everything on the drive Windows is installed on, protecting that data from theft or unauthorized access. Microsoft BitLocker improves file and system protections by mitigating unauthorized data access. It uses the Advanced Encryption Standard algorithm with 128- or 256-bit keys.

Why is BitLocker failing? ›

Causes: BitLocker encryption failure can be caused by a variety of factors, including issues with the TPM, hard drive, or operating system. It can also occur if the hard drive does not meet BitLocker's requirements for encryption.

Top Articles
Top courses and careers for maths students - Online Manipal
What are the components of the Blockchain Ecosystem?
Katie Pavlich Bikini Photos
Gamevault Agent
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
Things To Do In Atlanta Tomorrow Night
Non Sequitur
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Walgreens Alma School And Dynamite
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Rogold Extension
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Stoughton Commuter Rail Schedule
Bedbathandbeyond Flemington Nj
Free Carnival-themed Google Slides & PowerPoint templates
Otter Bustr
Selly Medaline
Latest Posts
Article information

Author: Fr. Dewey Fisher

Last Updated:

Views: 5942

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Fr. Dewey Fisher

Birthday: 1993-03-26

Address: 917 Hyun Views, Rogahnmouth, KY 91013-8827

Phone: +5938540192553

Job: Administration Developer

Hobby: Embroidery, Horseback riding, Juggling, Urban exploration, Skiing, Cycling, Handball

Introduction: My name is Fr. Dewey Fisher, I am a powerful, open, faithful, combative, spotless, faithful, fair person who loves writing and wants to share my knowledge and understanding with you.