msrc_cve-2024-20666
Vulnerability from csaf_microsoft
Published
2024-01-09 08:00
Modified
2024-01-12 08:00
Summary
BitLocker Security Feature Bypass Vulnerability

Notes

Additional Resources
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer
The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Customer Action
Required. The vulnerability documented by this CVE requires customer action to resolve.



{
  "document": {
    "acknowledgments": [
      {
        "names": [
          "Zammis Clark"
        ]
      }
    ],
    "aggregate_severity": {
      "namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      },
      {
        "category": "general",
        "text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
        "title": "Customer Action"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2024-20666 BitLocker Security Feature Bypass Vulnerability - HTML",
        "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20666"
      },
      {
        "category": "self",
        "summary": "CVE-2024-20666 BitLocker Security Feature Bypass Vulnerability - CSAF",
        "url": "https://msrc.microsoft.com/csaf/advisories/2024/msrc_cve-2024-20666.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Exploitability Index",
        "url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "BitLocker Security Feature Bypass Vulnerability",
    "tracking": {
      "current_release_date": "2024-01-12T08:00:00.000Z",
      "generator": {
        "date": "2025-05-03T01:46:23.031Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2024-20666",
      "initial_release_date": "2024-01-09T08:00:00.000Z",
      "revision_history": [
        {
          "date": "2024-01-09T08:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        },
        {
          "date": "2024-01-10T08:00:00.000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Updated FAQ information. This is an informational change only."
        },
        {
          "date": "2024-01-12T08:00:00.000Z",
          "legacy_version": "1.2",
          "number": "3",
          "summary": "Updated FAQ information. This is an informational change only."
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.17763.5329",
            "product": {
              "name": "Windows 10 Version 1809 for 32-bit Systems \u003c10.0.17763.5329",
              "product_id": "20"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.17763.5329",
            "product": {
              "name": "Windows 10 Version 1809 for 32-bit Systems 10.0.17763.5329",
              "product_id": "11568"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 1809 for 32-bit Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.17763.5329",
            "product": {
              "name": "Windows 10 Version 1809 for x64-based Systems \u003c10.0.17763.5329",
              "product_id": "19"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.17763.5329",
            "product": {
              "name": "Windows 10 Version 1809 for x64-based Systems 10.0.17763.5329",
              "product_id": "11569"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 1809 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.17763.5329",
            "product": {
              "name": "Windows 10 Version 1809 for ARM64-based Systems \u003c10.0.17763.5329",
              "product_id": "18"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.17763.5329",
            "product": {
              "name": "Windows 10 Version 1809 for ARM64-based Systems 10.0.17763.5329",
              "product_id": "11570"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 1809 for ARM64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.17763.5329",
            "product": {
              "name": "Windows Server 2019 \u003c10.0.17763.5329",
              "product_id": "17"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.17763.5329",
            "product": {
              "name": "Windows Server 2019 10.0.17763.5329",
              "product_id": "11571"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2019"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.17763.5329",
            "product": {
              "name": "Windows Server 2019 (Server Core installation) \u003c10.0.17763.5329",
              "product_id": "16"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.17763.5329",
            "product": {
              "name": "Windows Server 2019 (Server Core installation) 10.0.17763.5329",
              "product_id": "11572"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2019 (Server Core installation)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.20348.2227",
            "product": {
              "name": "Windows Server 2022 \u003c10.0.20348.2227",
              "product_id": "15"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.20348.2227",
            "product": {
              "name": "Windows Server 2022 10.0.20348.2227",
              "product_id": "11923"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2022"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.20348.2227",
            "product": {
              "name": "Windows Server 2022 (Server Core installation) \u003c10.0.20348.2227",
              "product_id": "14"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.20348.2227",
            "product": {
              "name": "Windows Server 2022 (Server Core installation) 10.0.20348.2227",
              "product_id": "11924"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2022 (Server Core installation)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.22000.2713",
            "product": {
              "name": "Windows 11 version 21H2 for x64-based Systems \u003c10.0.22000.2713",
              "product_id": "13"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.22000.2713",
            "product": {
              "name": "Windows 11 version 21H2 for x64-based Systems 10.0.22000.2713",
              "product_id": "11926"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 11 version 21H2 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.22000.2713",
            "product": {
              "name": "Windows 11 version 21H2 for ARM64-based Systems \u003c10.0.22000.2713",
              "product_id": "12"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.22000.2713",
            "product": {
              "name": "Windows 11 version 21H2 for ARM64-based Systems 10.0.22000.2713",
              "product_id": "11927"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 11 version 21H2 for ARM64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.19044.3930",
            "product": {
              "name": "Windows 10 Version 21H2 for 32-bit Systems \u003c10.0.19044.3930",
              "product_id": "11"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.19044.3930",
            "product": {
              "name": "Windows 10 Version 21H2 for 32-bit Systems 10.0.19044.3930",
              "product_id": "11929"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 21H2 for 32-bit Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.19044.3930",
            "product": {
              "name": "Windows 10 Version 21H2 for ARM64-based Systems \u003c10.0.19044.3930",
              "product_id": "10"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.19044.3930",
            "product": {
              "name": "Windows 10 Version 21H2 for ARM64-based Systems 10.0.19044.3930",
              "product_id": "11930"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 21H2 for ARM64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.19044.3930",
            "product": {
              "name": "Windows 10 Version 21H2 for x64-based Systems \u003c10.0.19044.3930",
              "product_id": "9"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.19044.3930",
            "product": {
              "name": "Windows 10 Version 21H2 for x64-based Systems 10.0.19044.3930",
              "product_id": "11931"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 21H2 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.22621.3007",
            "product": {
              "name": "Windows 11 Version 22H2 for ARM64-based Systems \u003c10.0.22621.3007",
              "product_id": "8"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.22621.3007",
            "product": {
              "name": "Windows 11 Version 22H2 for ARM64-based Systems 10.0.22621.3007",
              "product_id": "12085"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 11 Version 22H2 for ARM64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.22621.3007",
            "product": {
              "name": "Windows 11 Version 22H2 for x64-based Systems \u003c10.0.22621.3007",
              "product_id": "7"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.22621.3007",
            "product": {
              "name": "Windows 11 Version 22H2 for x64-based Systems 10.0.22621.3007",
              "product_id": "12086"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 11 Version 22H2 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.19045.3930",
            "product": {
              "name": "Windows 10 Version 22H2 for x64-based Systems \u003c10.0.19045.3930",
              "product_id": "6"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.19045.3930",
            "product": {
              "name": "Windows 10 Version 22H2 for x64-based Systems 10.0.19045.3930",
              "product_id": "12097"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 22H2 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.19045.3930",
            "product": {
              "name": "Windows 10 Version 22H2 for ARM64-based Systems \u003c10.0.19045.3930",
              "product_id": "5"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.19045.3930",
            "product": {
              "name": "Windows 10 Version 22H2 for ARM64-based Systems 10.0.19045.3930",
              "product_id": "12098"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 22H2 for ARM64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.19045.3930",
            "product": {
              "name": "Windows 10 Version 22H2 for 32-bit Systems \u003c10.0.19045.3930",
              "product_id": "4"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.19045.3930",
            "product": {
              "name": "Windows 10 Version 22H2 for 32-bit Systems 10.0.19045.3930",
              "product_id": "12099"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 22H2 for 32-bit Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.22631.3007",
            "product": {
              "name": "Windows 11 Version 23H2 for ARM64-based Systems \u003c10.0.22631.3007",
              "product_id": "3"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.22631.3007",
            "product": {
              "name": "Windows 11 Version 23H2 for ARM64-based Systems 10.0.22631.3007",
              "product_id": "12242"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 11 Version 23H2 for ARM64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.22631.3007",
            "product": {
              "name": "Windows 11 Version 23H2 for x64-based Systems \u003c10.0.22631.3007",
              "product_id": "2"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.22631.3007",
            "product": {
              "name": "Windows 11 Version 23H2 for x64-based Systems 10.0.22631.3007",
              "product_id": "12243"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 11 Version 23H2 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.25398.643",
            "product": {
              "name": "Windows Server 2022, 23H2 Edition (Server Core installation) \u003c10.0.25398.643",
              "product_id": "1"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.25398.643",
            "product": {
              "name": "Windows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.643",
              "product_id": "12244"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2022, 23H2 Edition (Server Core installation)"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.10240.20402",
            "product": {
              "name": "Windows 10 for 32-bit Systems \u003c10.0.10240.20402",
              "product_id": "26"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.10240.20402",
            "product": {
              "name": "Windows 10 for 32-bit Systems 10.0.10240.20402",
              "product_id": "10729"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 for 32-bit Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.10240.20402",
            "product": {
              "name": "Windows 10 for x64-based Systems \u003c10.0.10240.20402",
              "product_id": "25"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.10240.20402",
            "product": {
              "name": "Windows 10 for x64-based Systems 10.0.10240.20402",
              "product_id": "10735"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.14393.6614",
            "product": {
              "name": "Windows 10 Version 1607 for 32-bit Systems \u003c10.0.14393.6614",
              "product_id": "23"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.14393.6614",
            "product": {
              "name": "Windows 10 Version 1607 for 32-bit Systems 10.0.14393.6614",
              "product_id": "10852"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 1607 for 32-bit Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.14393.6614",
            "product": {
              "name": "Windows 10 Version 1607 for x64-based Systems \u003c10.0.14393.6614",
              "product_id": "22"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.14393.6614",
            "product": {
              "name": "Windows 10 Version 1607 for x64-based Systems 10.0.14393.6614",
              "product_id": "10853"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows 10 Version 1607 for x64-based Systems"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.14393.6614",
            "product": {
              "name": "Windows Server 2016 \u003c10.0.14393.6614",
              "product_id": "24"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.14393.6614",
            "product": {
              "name": "Windows Server 2016 10.0.14393.6614",
              "product_id": "10816"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2016"
      },
      {
        "branches": [
          {
            "category": "product_version_range",
            "name": "\u003c10.0.14393.6614",
            "product": {
              "name": "Windows Server 2016 (Server Core installation) \u003c10.0.14393.6614",
              "product_id": "21"
            }
          },
          {
            "category": "product_version",
            "name": "10.0.14393.6614",
            "product": {
              "name": "Windows Server 2016 (Server Core installation) 10.0.14393.6614",
              "product_id": "10855"
            }
          }
        ],
        "category": "product_name",
        "name": "Windows Server 2016 (Server Core installation)"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-20666",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "general",
          "text": "Microsoft",
          "title": "Assigning CNA"
        },
        {
          "category": "faq",
          "text": "A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.",
          "title": "What kind of security feature could be bypassed by successfully exploiting this vulnerability?"
        },
        {
          "category": "faq",
          "text": "Depending on the version of Windows you are running, you may need to take additional steps to update Windows Recovery Environment (WinRE) to be protected from this vulnerability.\nFor the latest version of Windows the process of updating WinRE is now fully automated.  The following versions of Windows require no additional steps as WinRE will be updated as a part of Latest Cumulative Update if you are getting updates from Windows Update and WSUS.:\nWindows 11 Version 23H2 for x64-based Systems, Windows 11 Version 23H2 for ARM64-based Systems, Windows 11 Version 22H2 for x64-based Systems, Windows 11 Version 22H2 for ARM64-based Systems\nFor the following versions of Windows, Windows Recovery Environment updates listed below are available that automatically apply latest Safe OS Dynamic Update to WinRE from the running Windows OS:\nWindows Server 2022 (Server Core installation) (KB5034439: Windows Recovery Environment update for Azure Stack HCI, version 22H2 and Windows Server 2022: Jan 9, 2024), Windows Server 2022 (KB5034439: Windows Recovery Environment update for Azure Stack HCI, version 22H2 and Windows Server 2022: January 9, 2024), Windows Server 2022, 23H2 Edition (Server Core installation) (KB5034439: Windows Recovery Environment update for Azure Stack HCI, version 22H2 and Windows Server 2022: January 9, 2024), Windows 11 version 21H2 for x64-based Systems (KB5034440: Windows Recovery Environment update for Windows 11, version 21H2: January 9, 2024), Windows 10 Version 22H2 for x64-based Systems (KB5034441: Windows Recovery Environment update for Windows 10, version 21H2 and 22H2: January 9, 2024), Windows 10 Version 22H2 for 32-bit Systems (KB5034441: Windows Recovery Environment update for Windows 10, version 21H2 and 22H2: January 9, 2024), Windows 10 Version 21H2 for x64-based Systems (KB5034441: Windows Recovery Environment update for Windows 10, version 21H2 and 22H2: January 9, 2024), Windows 10 Version 21H2 for 32-bit Systems (KB5034441: Windows Recovery Environment update for Windows 10, version 21H2 and 22H2: January 9, 2024)\nAs an alternative to updates provided above or if your version of Windows is not listed above, you can download the latest Windows Safe OS Dynamic Update from the Microsoft Update Catalog. You can then apply the WinRE update, see \u202fAdd an update package to Windows RE. To automate your installation Microsoft has developed a sample script that can help with updating WinRE from the running Windows OS. Please see KB5034957: Updating the WinRE partition on deployed devices to address security vulnerabilities in CVE-2024-20666 for more information.\nNo. The exploit is only possible with the winre.wim on the recovery partition of the device.\nNo. A BitLocker encrypted drive cannot be accessed via an arbitrary WinRE WIM file hosted on an external drive. Please complete all steps in Microsoft Learn |\u202fAdd an Update to Windows RE | Apply the update to a running PC\u202fto ensure that the updated Windows RE image is turned on and correctly configured for your Windows installation.\nNo. To exploit the vulnerability the attacker needs to know the TPM PIN if the user is protected by the BitLocker TPM+PIN.\nUse DISM /Get-Packages on a mounted WinRE image to ensure latest Safe OS Dynamic Update package is present. For more information, see Check the WinRE image version.",
          "title": "Are there additional steps that I need to take to be protected from this vulnerability?"
        }
      ],
      "product_status": {
        "fixed": [
          "10729",
          "10735",
          "10816",
          "10852",
          "10853",
          "10855",
          "11568",
          "11569",
          "11570",
          "11571",
          "11572",
          "11923",
          "11924",
          "11926",
          "11927",
          "11929",
          "11930",
          "11931",
          "12085",
          "12086",
          "12097",
          "12098",
          "12099",
          "12242",
          "12243",
          "12244"
        ],
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5",
          "6",
          "7",
          "8",
          "9",
          "10",
          "11",
          "12",
          "13",
          "14",
          "15",
          "16",
          "17",
          "18",
          "19",
          "20",
          "21",
          "22",
          "23",
          "24",
          "25",
          "26"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-20666 BitLocker Security Feature Bypass Vulnerability - HTML",
          "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20666"
        },
        {
          "category": "self",
          "summary": "CVE-2024-20666 BitLocker Security Feature Bypass Vulnerability - CSAF",
          "url": "https://msrc.microsoft.com/csaf/advisories/2024/msrc_cve-2024-20666.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-01-09T08:00:00.000Z",
          "details": "10.0.17763.5329:Security Update:https://support.microsoft.com/help/5034127",
          "product_ids": [
            "20",
            "19",
            "18",
            "17",
            "16"
          ],
          "url": "https://support.microsoft.com/help/5034127"
        },
        {
          "category": "vendor_fix",
          "date": "2024-01-09T08:00:00.000Z",
          "details": "10.0.20348.2227:Security Update:https://support.microsoft.com/help/5034129",
          "product_ids": [
            "15",
            "14"
          ],
          "url": "https://support.microsoft.com/help/5034129"
        },
        {
          "category": "vendor_fix",
          "date": "2024-01-09T08:00:00.000Z",
          "details": "10.0.22000.2713:Security Update:https://support.microsoft.com/help/5034121",
          "product_ids": [
            "13",
            "12"
          ],
          "url": "https://support.microsoft.com/help/5034121"
        },
        {
          "category": "vendor_fix",
          "date": "2024-01-09T08:00:00.000Z",
          "details": "10.0.19044.3930:Security Update:https://support.microsoft.com/help/5034122",
          "product_ids": [
            "11",
            "10",
            "9"
          ],
          "url": "https://support.microsoft.com/help/5034122"
        },
        {
          "category": "vendor_fix",
          "date": "2024-01-09T08:00:00.000Z",
          "details": "10.0.22621.3007:Security Update:https://support.microsoft.com/help/5034123",
          "product_ids": [
            "8",
            "7"
          ],
          "url": "https://support.microsoft.com/help/5034123"
        },
        {
          "category": "vendor_fix",
          "date": "2024-01-09T08:00:00.000Z",
          "details": "10.0.19045.3930:Security Update:https://support.microsoft.com/help/5034122",
          "product_ids": [
            "6",
            "5",
            "4"
          ],
          "url": "https://support.microsoft.com/help/5034122"
        },
        {
          "category": "vendor_fix",
          "date": "2024-01-09T08:00:00.000Z",
          "details": "10.0.22631.3007:Security Update:https://support.microsoft.com/help/5034123",
          "product_ids": [
            "3",
            "2"
          ],
          "url": "https://support.microsoft.com/help/5034123"
        },
        {
          "category": "vendor_fix",
          "date": "2024-01-09T08:00:00.000Z",
          "details": "10.0.25398.643:Security Update:https://support.microsoft.com/help/5034130",
          "product_ids": [
            "1"
          ],
          "url": "https://support.microsoft.com/help/5034130"
        },
        {
          "category": "vendor_fix",
          "date": "2024-01-09T08:00:00.000Z",
          "details": "10.0.10240.20402:Security Update:https://support.microsoft.com/help/5034134",
          "product_ids": [
            "26",
            "25"
          ],
          "url": "https://support.microsoft.com/help/5034134"
        },
        {
          "category": "vendor_fix",
          "date": "2024-01-09T08:00:00.000Z",
          "details": "10.0.14393.6614:Security Update:https://support.microsoft.com/help/5034119",
          "product_ids": [
            "23",
            "22",
            "24",
            "21"
          ],
          "url": "https://support.microsoft.com/help/5034119"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "environmentalsScore": 0.0,
            "exploitCodeMaturity": "UNPROVEN",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "remediationLevel": "OFFICIAL_FIX",
            "reportConfidence": "CONFIRMED",
            "scope": "UNCHANGED",
            "temporalScore": 5.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5",
            "6",
            "7",
            "8",
            "9",
            "10",
            "11",
            "12",
            "13",
            "14",
            "15",
            "16",
            "17",
            "18",
            "19",
            "20",
            "21",
            "22",
            "23",
            "24",
            "25",
            "26"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Security Feature Bypass"
        },
        {
          "category": "exploit_status",
          "details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely"
        }
      ],
      "title": "BitLocker Security Feature Bypass Vulnerability"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…