Authorization bypass through user-controlled key in Microsoft BitLocker



Published: 2024-04-10
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-20665
CWE-ID CWE-639
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Windows
Operating systems & Components / Operating system

Windows Server
Operating systems & Components / Operating system

Vendor Microsoft

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Authorization bypass through user-controlled key

EUVDB-ID: #VU88427

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-20665

CWE-ID: CWE-639 - Authorization Bypass Through User-Controlled Key

Exploit availability: No

Description

The vulnerability allows a local user to bypass authentication process.

The vulnerability exists due to authorization bypass through user-controlled key in BitLocker. An administrator with physical access can bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: 10 - 11 23H2

Windows Server: 2012 - 2022 23H2

External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20665


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###