A security researcher, using the alias Chaotic Eclipse, has publicly disclosed two unpatched zero-day vulnerabilities in Microsoft Windows, releasing proof-of-concept (PoC) exploit code for both. The disclosure was made in an act of protest against the Microsoft Security Response Center (MSRC) bug reporting process. The first vulnerability, dubbed YellowKey, allows an attacker with physical access to bypass BitLocker encryption on modern Windows versions. The second, GreenPlasma, is a local privilege escalation (LPE) flaw in the Windows Collaborative Translation Framework. The public availability of these exploits creates a critical situation for Windows administrators, as there are no official patches, and reports indicate the exploits are already being weaponized.
FsTx files onto a USB drive or the system's EFI partition. By rebooting the machine into WinRE, a command shell is triggered, providing access to the unlocked, decrypted BitLocker-protected volume.T1553 - Subvert Trust Controls.CTFMON).T1068 - Exploitation for Privilege Escalation.Both vulnerabilities are considered zero-days with publicly available PoC exploit code. This significantly lowers the bar for other threat actors to adopt and weaponize them. Reports from security news outlets suggest that the exploits were already being integrated into active attack campaigns within 24 hours of their public release.
The public disclosure of unpatched, working exploits for critical vulnerabilities presents a severe risk to all organizations using modern Windows operating systems.
The combination of these two flaws being available simultaneously creates a potent cocktail for attackers.
The following patterns may help identify vulnerable or compromised systems:
For YellowKey:
FsTx files on EFI partitions or removable media connected to sensitive systems.For GreenPlasma:
ctfmon.exe process.ctfmon.exe or any attempts by low-privilege processes to interact with system-level services in an unusual manner.ReAgentc.xml) or for logs indicating the system has booted into recovery mode.As of this report, there are no official patches from Microsoft. The following are compensating controls:
For YellowKey:
For GreenPlasma:
New context for YellowKey/GreenPlasma zero-days: released post-Patch Tuesday, affects Server 2026, and researcher's history of prior exploits.
The new article provides additional context regarding the YellowKey and GreenPlasma zero-day exploits. It highlights that the PoCs were released immediately after Microsoft's May Patch Tuesday, emphasizing the lack of official patches. The affected server versions for GreenPlasma are updated to include Windows Server 2026. Crucially, the article references the researcher's past disclosure of 'BlueHammer,' which was subsequently exploited, reinforcing the high likelihood of these new exploits being weaponized by threat actors.
New hunting hints and refined technical analysis for YellowKey and GreenPlasma zero-days, including clarification on TPM bypass for BitLocker.
This update provides more specific hunting hints for the GreenPlasma privilege escalation vulnerability, including monitoring for Windows Security Event ID 4673 and suspicious cmd.exe or powershell.exe processes spawning with SYSTEM privileges, often preceded by whoami /priv commands. For YellowKey, the analysis clarifies that the BitLocker bypass is reported to work even when a Trusted Platform Module (TPM) is in use, undermining TPM-based key protection. Mitigation strategies are further detailed with references to D3FEND techniques like Physical Security and Executable Allowlisting.
New details for YellowKey BitLocker bypass confirm Windows 10 is unaffected, specify CTRL key trigger in WinRE, and add enhanced mitigations like BIOS/UEFI passwords.
Further analysis of the YellowKey BitLocker bypass reveals that Windows 10 is not affected, clarifying the scope of the vulnerability. The attack specifically involves holding the CTRL key during the Windows Recovery Environment (WinRE) boot process to trigger the flaw, as reproduced by researcher Will Dormann. There is also speculation regarding the possibility of an intentional backdoor. Additional mitigation strategies now include setting strong BIOS/UEFI passwords and considering file-level encryption for sensitive data, beyond just BitLocker with a PIN.
Researcher 'Chaotic Eclipse' publicly discloses the YellowKey and GreenPlasma vulnerabilities and their PoC exploits.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.