Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Posted on May 14, 2026 By CWS

Two new critical vulnerabilities in Windows, named YellowKey and GreenPlasma, have been publicly disclosed by a security researcher dissatisfied with Microsoft’s handling of security reports. These zero-day exploits, if leveraged, could enable attackers to bypass BitLocker and gain elevated privileges.

Understanding the YellowKey Exploit

The YellowKey vulnerability targets Windows’ BitLocker encryption system, which is designed to protect user data through hardware-based security measures using the Trusted Platform Module (TPM). Disclosed by a researcher known as Chaotic Eclipse, YellowKey allows an attacker with physical access to a Windows 11 machine to circumvent BitLocker and access encrypted storage volumes.

The proof-of-concept (PoC) for this exploit begins by copying specific files onto a USB or the EFI partition. The Windows device is then rebooted into the Windows Recovery Environment (WinRE), where a sequence of key presses unlocks access to the supposedly protected data. This has raised concerns about a potential backdoor within BitLocker’s architecture.

Insights into the GreenPlasma Exploit

Chaotic Eclipse also unveiled another zero-day exploit named GreenPlasma, which focuses on privilege escalation. This vulnerability enables attackers to gain System-level access, potentially allowing them to disable security protections and manipulate critical system processes.

The GreenPlasma PoC demonstrates creating arbitrary memory sections in directories writable by the System, which can be exploited to interfere with Windows services. Although the PoC lacks the full code to achieve System shell access, it highlights a significant risk for system integrity and security.

Impact and Industry Response

The disclosure of these vulnerabilities has caught the attention of several cybersecurity researchers who have verified the effectiveness of the exploits on recent Windows 11 builds. Notably, YellowKey also poses a threat to devices secured with a TPM PIN, contingent on the WinRE implementation.

Security experts like Joshua Roback from Swimlane emphasize the importance of scrutinizing any path that leads to System-level privileges, as it could facilitate broader attacks, including malware deployment. Ross Filipek from Corsica Technologies warns that public release of such PoCs accelerates the risk of these exploits being weaponized in real-world attacks.

Microsoft has been contacted for a statement regarding these zero-day vulnerabilities. The tech giant’s response and potential patches are anticipated by the cybersecurity community, especially in light of previous incidents where vulnerabilities were exploited shortly after disclosure.

These recent revelations underscore the ongoing challenges in maintaining robust security for operating systems and highlight the critical need for timely patches and updates to safeguard user data and system integrity.

Security Week News Tags:BitLocker bypass, Cybersecurity, Exploits, GreenPlasma, Microsoft, privilege escalation, proof-of-concept, security research, security updates, SYSTEM access, TPM, Windows vulnerabilities, WinRE, YellowKey, zero-day exploits

Post navigation

Previous Post: Fragnesia Linux Kernel Vulnerability Allows Root Access
Next Post: Critical Vulnerability in MongoDB Risks Data Exposure

Related Posts

Cisco Alerts on Exploitation of SD-WAN Vulnerabilities Cisco Alerts on Exploitation of SD-WAN Vulnerabilities Security Week News
Senate Committee Advances Trump Nominee to Lead CISA Senate Committee Advances Trump Nominee to Lead CISA Security Week News
Qantas Hit with Extortion Demand After Data Breach Qantas Hit with Extortion Demand After Data Breach Security Week News
Google Patches High-Severity Chrome Vulnerability in Latest Update Google Patches High-Severity Chrome Vulnerability in Latest Update Security Week News
High-Value NPM Developers Compromised in New Phishing Campaign High-Value NPM Developers Compromised in New Phishing Campaign Security Week News
 Million Worth of Bitcoin Seized in Cryptomixer Takedown $29 Million Worth of Bitcoin Seized in Cryptomixer Takedown Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark