How the 'FailRelock' Flag Let Attackers Bypass BitLocker for the Fifth Time

A debug flag named FailRelock in Windows' recovery environment disables BitLocker relocking when set to 1, allowing an attacker with a USB drive and a modified INI file to obtain full access to encrypted drives—a fifth such breach in five years, highlighted with attack steps, technical analysis, and mitigation advice.

Black & White Path
Black & White Path
Black & White Path
How the 'FailRelock' Flag Let Attackers Bypass BitLocker for the Fifth Time

Incident Overview

Security researcher @weezerOSINT discovered a debug flag named FailRelock in the Windows Recovery Environment (WinRE). When the flag is set to 1, BitLocker never re‑locks after it is unlocked, effectively nullifying the encryption.

Attack Steps (single‑USB method)

普通人:
┌─────────────────────────────────────┐
│ 1. Boot a USB stick into WinRE               │
│ 2. Create <em>RecoverySimulation.ini</em>       │
│ 3. Set <em>Active=Yes, FailRelock=1</em>        │
│ 4. WinRE unlocks BitLocker                  │
│ 5. Launch <code>cmd.exe</code>, gaining full access │
│ 6. Encrypted drive is now exposed            │
└─────────────────────────────────────┘

微软工程师:
┌─────────────────────────────────────┐
│ "测试完了,代码先不删了"                │
│ "反正用户也不会发现"                    │
│ "flag名字就叫FailRelock吧"               │
│ "毕竟我们是微软"                        │
└─────────────────────────────────────┘

The entire exploit requires only a USB stick and a modified RecoverySimulation.ini file; no expensive hardware, zero‑day exploits, or GPU cracking is needed.

Intended Purpose of the Flag

Designed as a test switch to keep the system unlocked during debugging.

When enabled, the lock operation fails permanently.

The literal name “FailRelock” reflects this behavior.

BitLocker Bypass History (2022‑2026)

2022 – CVE‑2022‑41099 (BitLocker bypass)

2023 – CVE‑2023‑21563 (BitLocker bypass)

2024 – CVE‑2024‑20666 (BitLocker bypass)

2024 – BitUnlocker (BitLocker bypass)

2026 – YellowKey (FailRelock) (BitLocker bypass)

Five incidents in five years illustrate a recurring design issue rather than isolated bugs.

Technical Reasoning

BitLocker’s trust model:

正常启动:TPM验证 → 解锁 → 系统启动
恢复启动:WinRE环境 → 解锁 → 弹cmd

BitLocker assumes WinRE is a trusted recovery environment. The hidden FailRelock switch breaks this assumption, allowing an attacker to keep the drive unlocked after WinRE‑based recovery.

Analogy: a house with a sturdy front door but a spare key hidden behind a nail labeled “test only”.

Mitigation Measures

Enable Secure Boot – prevents booting from external USB media.

TPM 2.0 + PIN – adds a credential requirement that makes pure physical attacks harder.

Disable USB boot – can be turned off in the BIOS/UEFI settings.

Regular system updates – ensures any future patches for the design flaw are applied.

Physical attacks remain difficult to fully prevent, but limiting easy access to the machine reduces exposure.

Code‑Quality Reflection

"They left an entire debug testing framework in production."

Test code should be removed before release.

Debug switches must not be shipped to production environments.

Flags like FailRelock should carry a clear “_TEST_MODE_ONLY_DELETE_BEFORE_SHIP” suffix.

The flag remained in the released WinRE, likely due to oversight or schedule pressure, and was discovered five years later.

Future Outlook

The researcher hinted at a next vulnerability named GreenPlasma , described as an arbitrary‑segment privilege‑escalation issue in Windows CTFMON.

BitLocker FailRelock vulnerability diagram
BitLocker FailRelock vulnerability diagram
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

Secure BootSecurity VulnerabilityTPMBitLockerDebug FlagFailRelockWindows Recovery Environment
Black & White Path
Written by

Black & White Path

We are the beacon of the cyber world, a stepping stone on the road to security.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.