The Windows operating system suffers from a major security vulnerability. A new leak in the OS allows attackers to bypass BitLocker encryption and gain administrator access to the device–a worrisome development for computer users, which may also affect IoT devices running Windows 10. Microsoft has released a patch since the flaw was discovered, but it shows that there is still a lot of work to be done.
It is positive to see the technology giant take this type of feedback to heart and address problems as they arise. Sami Laiho, a Windows expert, discovered this vulnerability a few weeks ago. A local assailant could bypass the BitLocker encryption found in Windows 10 and completely take over the machine as a result.
This flaw is made possible due to the feature of updates rolled out as part of Windows 10. For example, the recent Anniversary Update proves to be quite a security risk. Every single update leads to the creation of an “image” and installs it without the Windows preinstallation environment. This process, however, is vulnerable to attack, and users can still access the command prompt during this stage by pressing “Shift” and “F10” at the same time.
Using said command prompt opens up a virtual can of worms, as attackers can access all files on the hard drive. In most cases, the details would be encrypted by BitLocker, but that is not the case when accessing them from this environment. Additionally, the command prompt is executed with full administrator rights, which is not positive news for any system admin.
In the video posted by Laiho, he showcased replacing Windows shortcuts with the command prompt during the update process. Once that step was completed, he was able to gain access to a full admin access command prompt, despite only being a sub-user of the computer itself. All he had to do was press the “Shift” key five times to take advantage of this flaw.
Every time a new Windows 10 update is released, systems not installing the latest security updates will remain vulnerable to this type of attack. An alternative option would be for assailants to access the Insider program, although that is far more difficult. Although criminals do not shy away from challenges, there is no reason to make things more difficult than need be.
Thankfully, Microsoft patched this vulnerability through a security update. Users will still need to download this patch to ensure that their systems are safe, though. Remaining vigilant and limiting the access to the command prompt are two possible solutions. Then again, anyone with local access to the machine is capable of bypassing unpatched security precautions, regardless.
If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.
The U.S. Securities and Exchange Commission has approved Bitwise’s spot Chainlink ETF, marking the first…
Rumble and Tether have officially launched the Rumble Wallet, a self-custodial crypto wallet integrated directly…
BNB Chain is preparing to activate its Fermi hard fork on January 14 at 2:30…
Ethereum closes 2025 having firmly established itself as the secure foundation for an expanding digital…
Solana ends 2025 as one of the few blockchain ecosystems where revenue, assets, and trading…
Morgan Stanley has taken a decisive step into the regulated crypto investment market, filing its…