Another major flaw (Why can't Microsoft do anything right?)

Discuss Windows Vista/Server 2008 to Windows 10.
Post Reply
MrFreeman
Posts: 341
Joined: Fri May 09, 2014 12:22 am
Location: USA

Another major flaw (Why can't Microsoft do anything right?)

Post by MrFreeman »

So another major security flaw with Windows 10 has just been revealed. http://www.ghacks.net/2016/11/30/bitloc ... -upgrades/

Now Bitlocker has always been a joke, but this just makes it worse:
Martin Brinkmann wrote:A security researcher discovered a new issue in Microsoft's Windows 10 operating system that allows attackers to gain access to BitLocker encrypted data.

A post on the Win-Fu blog highlights the method. Basically, what the method does is exploit a troubleshooting feature that is enabled during the upgrade process.
There is a small but CRAZY bug in the way the "Feature Update" (previously known as "Upgrade") is installed. The installation of a new build is done by reimaging the machine and the image installed by a small version of Windows called Windows PE (Preinstallation Environment).

This has a feature for troubleshooting that allows you to press SHIFT+F10 to get a Command Prompt. This sadly allows for access to the hard disk as during the upgrade Microsoft disables BitLocker.
If you press Shift-F10, you open a command prompt window which lets you access the storage devices of the operating system.

Since BitLocker protection is disabled during upgrades, it means that anyone exploiting the issue gets access to all files that are usually encrypted by BitLocker.
Microsoft advertises that Windows 10 is the most secure version of Windows, but yet it is disproven time and time again. In my opinion if you must use Windows 10, just use Veracrypt instead to encrypt your drive. What do you guys think about this?
Half-Life is a pretty good game.

mrpijey
User avatar
Administrator
Posts: 9193
Joined: Tue Feb 12, 2008 5:28 pm
Contact:

Re: Another major flaw (Why can't Microsoft do anything righ

Post by mrpijey »

I've tried this on my machine (which uses Bitlocker on all drives), and it didn't work.
Image
Official guidelines: Contribution Guidelines
Channels: Discord :: Twitter :: YouTube
Misc: Archived UUP

The Distractor

Re: Another major flaw (Why can't Microsoft do anything righ

Post by The Distractor »

shift+10 in setup and upgrade is actually *documented*.

I actually use it every build upgrade to tail -f setupact.log (giving me extra info on update progress).

MrFreeman
Posts: 341
Joined: Fri May 09, 2014 12:22 am
Location: USA

Re: Another major flaw (Why can't Microsoft do anything righ

Post by MrFreeman »

The Distractor wrote:shift+10 in setup and upgrade is actually *documented*.

I actually use it every build upgrade to tail -f setupact.log (giving me extra info on update progress).
Isn't "tail" a bash command? How would that work within the WinPE environment. I didn't think it would support WSL.
Half-Life is a pretty good game.

Goldfish64
User avatar
Donator
Posts: 491
Joined: Mon Feb 02, 2015 6:20 pm
Location: USA

Re: Another major flaw (Why can't Microsoft do anything righ

Post by Goldfish64 »

Both the Shift+F10 and the fact that BitLocker is suspended during OS upgrades is well known. Been that way since Vista.
Goldfish64

The Distractor

Re: Another major flaw (Why can't Microsoft do anything righ

Post by The Distractor »

MrFreeman wrote:
The Distractor wrote:shift+10 in setup and upgrade is actually *documented*.

I actually use it every build upgrade to tail -f setupact.log (giving me extra info on update progress).
Isn't "tail" a bash command? How would that work within the WinPE environment. I didn't think it would support WSL.
Not using wsl, but tail.exe as provided by mingw/msys.

veovis
Posts: 3
Joined: Wed Sep 14, 2016 2:50 pm

Re: Another major flaw (Why can't Microsoft do anything righ

Post by veovis »

The Distractor wrote:shift+10 in setup and upgrade is actually *documented*.

I actually use it every build upgrade to tail -f setupact.log (giving me extra info on update progress).
Same here, especially when troubleshooting deployments done via SCCM. When troubleshooting a failed SCCM deployment, often the only way to get to the logs to see what failed is to use shift-f10 and either view them on the machine or copy them to external media because SCCM writes logs to a RAM drive.

I have also used it to troubleshoot issues on home PCs from the PE environment. This "security exploit" requires local console access and can't be performed remotely (at least not without some form of remote management, or network-based KVM).

In general it is always been recommended security practice to not leave machines unattended during an OS install or upgrade if the machine contains sensitive data or is not in a secure location. It is well documented that bitlocker encryption has to be temporarily disabled during OS install or upgrade operations and that applies to all versions of Windows that supports bitlocker - including versions of Windows Server not just Windows 10.

Post Reply