Remediating CVE-2024-20666 - BitLocker Security Feature Bypass Vulnerability (2024)

Microsoft have recently announced CVE-2024-20666 for BitLocker Device Encryption. As we start to understand the severity of the CVE and unpick the guidance from Microsoft, I am hoping to document what I understand and have learnt so far.

Last Updated: 09/02/2024.

Information:

CVE ID: CVE-2024-20666

CVE Severity: Medium

CVSS Base Score: 6.6

CVE Description: A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.

Products Affected: ["Systems with Bitlocker enabled, Windows 10, Windows 11"]

Exploit Publicly Disclosed: No

Exploit Publicly Available: No

Assumptions:

This article assumes:

  • You are running Windows 10, version 2004 or later.
  • The WinRE (recovery partition) has 250 MB of free space.
  • You have admin rights on the machine.

Disclaimer:

The information on CVE-2024-20666 provided here is based on my research as of February 8, 2024, and is shared for informational purposes only. While I aim to offer helpful insights, I make no guarantees about the accuracy or completeness of this information. Users should consult official Microsoft documentation for guidance and verify any suggested remediation steps against their specific system configurations. This post is independent of Microsoft and is not endorsed by them. Use the information at your own risk.

Remediation:

  1. Install patch for Microsoft Windows 10 19045 (Workstation): Security Update KB5034122
  2. Complete these remediation steps provided in the vendor advisories.

NOTE: The script in remediation step #2.2 is from 2022 and references older version numbers - e.g. ($fileRevision -ge 2247). Whilst this script will work for WinRE environments that have never been updated, the latest WinRE update does not update this file so an alternative detection method should be used if WinRE has been patched for CVE-2022-41099, to ensure WinRE.wim is at ServicePack Build >=3920.

If you would like an example of an updated detection method, please see the end of this article.

Single Line PowerShell Command to check the current Windows RE Service Pack Build Version Number:

Thanks & credit to Jordan Mc Connell for the below single line PS:

& { $WinReLocation=((reagentc /info | Select-String " Windows RE Location:").Line -replace "Windows RE Location:\s+", "").trim(); $WinReBuild = ((dism /get-imageinfo /ImageFile:$WinReLocation\winre.wim /index:1 | Select-String "ServicePack Build :")); $WinReBuild} 

Recommended by LinkedIn

Windows "Hello" and Security another love story with… Dominique Brack 9 years ago
Microsoft warns of new PrintNightmare vulnerability… Aparna Agarwal, CISM 1 year ago

Detailed Method to check the current Windows RE Service Pack Build Version Number:

Invoking "reagentc /info" will give you the path of the WinRE Environment.

EXAMPLE:C:\WINDOWS\system32>reagentc /infoWindows Recovery Environment (Windows RE) and system reset configurationInformation: Windows RE status: Enabled Windows RE location: \\?\GLOBALROOT\device\harddisk0\partition4\Recovery\WindowsRE<redacted> 

This path can then be used with the DISM command below to determine the version numbers of the WinRE environment.

DISM /Get-ImageInfo /ImageFile:<windows_re_location>\winre.wim /index:1EXAMPLE:DISM /Get-ImageInfo /ImageFile:\\?\GLOBALROOT\device\harddisk0\partition4\Recovery\WindowsRE\winre.wim /index:1 
Remediating CVE-2024-20666 - BitLocker Security Feature Bypass Vulnerability (4)

Updating WinRE to Remediate CVE-2024-20666:

Invoke the script to update the WinRE environment.

.\PatchWinREScript_2004plus -packagePath <path_to_kb5034232.cab> 

Example:

.\PatchWinREScript_2004plus -packagePath "C:\users\*\Desktop\windows10.0-kb5034232-x64_ff4651e9e031bad04f7fa645dc3dee1fe1435f38.cab" 
Remediating CVE-2024-20666 - BitLocker Security Feature Bypass Vulnerability (5)

Use the same command from earlier OR the single line PowerShell command to check the current Windows RE Service Pack Build Version Number:

# Single Line PowerShell Command (Kudos JM):& { $WinReLocation=((reagentc /info | Select-String " Windows RE Location:").Line -replace "Windows RE Location:\s+", "").trim(); $WinReBuild = ((dism /get-imageinfo /ImageFile:$WinReLocation\winre.wim /index:1 | Select-String "ServicePack Build :")); $WinReBuild} 
# Detailed Method:DISM /Get-ImageInfo /ImageFile:<windows_re_location>\winre.wim /index:1EXAMPLE:DISM /Get-ImageInfo /ImageFile:\\?\GLOBALROOT\device\harddisk0\partition4\Recovery\WindowsRE\winre.wim /index:1 
Remediating CVE-2024-20666 - BitLocker Security Feature Bypass Vulnerability (6)

Updated Detection Method for PatchWinREScript_2004plus.ps1

Replace the following sections of code:

Line #215: Change $targetBinary to look at "winload.exe", which has actually been updated in KB5034232.

$targetBinary=$mountDir + "\Windows\System32\winload.exe" #KB5034232 

Line #313-317: Change $fileRevision to >= new "winload.exe" version.

if ($fileRevision -ge 3920) #KB5034232{LogMessage("Windows 10, version 2004 with revision " + $fileRevision + " >= 3920, updates have been applied") 

Please note the below has not been tested but file versions for older Windows 10 versions appear to be:

#Windows 10, version 1507 10240.20400 #KB5034233#Windows 10, version 1607 14393.6610 #KB5034230#Windows 10, version 1809 17763.5322 #KB5034231#Windows 10, version 2004 1904X.3920 #KB5034232 

These can be updated in the same manner as above for each respective Windows version within the script.

Remediating CVE-2024-20666 - BitLocker Security Feature Bypass Vulnerability (2024)

FAQs

What is CVE 2024 20666? ›

We are aware of a Microsoft issue that concerns the recent OS update KB5034441 for Windows Recovery Environment (WinRE). This important update addresses a security vulnerability identified as CVE-2024-20666, which could potentially allow attackers to bypass BitLocker encryption by exploiting WinRE.

What is security bypass vulnerability? ›

An authentication bypass vulnerability is a weak point in the user authentication process. A cybercriminal exploiting such a weakness circumvents authentication altogether to gain access to an application, service, or device.

What is the BitLocker security flaw? ›

Tracked as CVE-2024-38058, this important severity security flaw can let attackers bypass the BitLocker Device Encryption feature and access encrypted data with physical access to the targeted device.

Which security feature bypass vulnerability exists in the way Microsoft asp net core parses encoded cookie names? ›

A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.

What would trigger BitLocker? ›

Bitlocker recovery mode can be triggered by a number of situations, including: A malicious attempt by a person or software to change the startup environment. Rootkits are one example. Moving the BitLocker-protected drive into a new computer.

What is a cookie a computer virus a file that makes it easier to access a web site and browser web application file a file that hackers use to steal your identity? ›

Cookies (often known as internet cookies) are text files with small pieces of data — like a username and password — that are used to identify your computer as you use a network.

What is cookie vulnerability? ›

Cookies (or other session tokens) not generated or transmitted securely are vulnerable to hijacking or poisoning. Cross-site scripting (XSS) is a common way to steal cookies, but a number of methods, including packet sniffing and brute force, may be used to gain unauthorized access to cookies.

What is cookie theft in network security? ›

Examples of cookie theft

Cross-site scripting (XSS) is a cyberattack where a hacker injects malicious code into a vulnerable website. After a user visits this website and a cookie is created, a hacker can use the cookie to impersonate the user and perform actions on the victim's behalf.

What are the weaknesses of BitLocker? ›

The recovery process can be cumbersome when users forget their BitLocker password or encounter a hardware failure. Recovering encrypted data often involves using a recovery key, which, if not stored securely, could lead to unauthorized access.

What is the downside to BitLocker? ›

Cons of BitLocker

Not having the key can lock legitimate users out of their own data and using BitLocker can significantly impact performance (up to 45%) in some cases.

What is BitLocker and its issues? ›

BitLocker enables users to encrypt everything on the drive Windows is installed on, protecting that data from theft or unauthorized access. Microsoft BitLocker improves file and system protections by mitigating unauthorized data access. It uses the Advanced Encryption Standard algorithm with 128- or 256-bit keys.

Why is BitLocker failing? ›

Causes: BitLocker encryption failure can be caused by a variety of factors, including issues with the TPM, hard drive, or operating system. It can also occur if the hard drive does not meet BitLocker's requirements for encryption.

Top Articles
BNB (BNB) Price Prediction 2024 2025 2026 2027 - 2030
What are Transaction Fees? Types and How to Calculate Their Impact
Walgreens Boots Alliance, Inc. (WBA) Stock Price, News, Quote & History - Yahoo Finance
Elleypoint
Craigslist Niles Ohio
Craigslist Vans
Beautiful Scrap Wood Paper Towel Holder
Craigslist Furniture Bedroom Set
15 Types of Pancake Recipes from Across the Globe | EUROSPAR NI
Pickswise the Free Sports Handicapping Service 2023
Lesson 3 Homework Practice Measures Of Variation Answer Key
The Many Faces of the Craigslist Killer
Missing 2023 Showtimes Near Lucas Cinemas Albertville
Oriellys St James Mn
Best Restaurants Ventnor
Q Management Inc
Golden Abyss - Chapter 5 - Lunar_Angel
TBM 910 | Turboprop Aircraft - DAHER TBM 960, TBM 910
Scotchlas Funeral Home Obituaries
Geometry Review Quiz 5 Answer Key
Timeforce Choctaw
Anotherdeadfairy
Defending The Broken Isles
Mandy Rose - WWE News, Rumors, & Updates
Workshops - Canadian Dam Association (CDA-ACB)
Craigslist List Albuquerque: Your Ultimate Guide to Buying, Selling, and Finding Everything - First Republic Craigslist
Netspend Ssi Deposit Dates For 2022 November
Jackass Golf Cart Gif
Restored Republic
Co10 Unr
Fairwinds Shred Fest 2023
Davita Salary
Justin Mckenzie Phillip Bryant
Audi Q3 | 2023 - 2024 | De Waal Autogroep
Goodwill Thrift Store & Donation Center Marietta Photos
Tds Wifi Outage
Craigslist Boats Eugene Oregon
The Transformation Of Vanessa Ray From Childhood To Blue Bloods - Looper
Crazy Balls 3D Racing . Online Games . BrightestGames.com
Craigslist Ludington Michigan
Craigslist Free Manhattan
San Bernardino Pick A Part Inventory
World Social Protection Report 2024-26: Universal social protection for climate action and a just transition
Ferguson Showroom West Chester Pa
Wordle Feb 27 Mashable
Take Me To The Closest Ups
St Als Elm Clinic
Zits Comic Arcamax
Campaign Blacksmith Bench
Image Mate Orange County
OSF OnCall Urgent Care treats minor illnesses and injuries
Latest Posts
Article information

Author: Fr. Dewey Fisher

Last Updated:

Views: 5942

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Fr. Dewey Fisher

Birthday: 1993-03-26

Address: 917 Hyun Views, Rogahnmouth, KY 91013-8827

Phone: +5938540192553

Job: Administration Developer

Hobby: Embroidery, Horseback riding, Juggling, Urban exploration, Skiing, Cycling, Handball

Introduction: My name is Fr. Dewey Fisher, I am a powerful, open, faithful, combative, spotless, faithful, fair person who loves writing and wants to share my knowledge and understanding with you.