{"uuid": "0b7e1586-54e9-40a6-a217-38ca0f8bb187", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-41099", "type": "published-proof-of-concept", "source": "https://t.me/RedTeamFeed/77", "content": "A Deep Dive into TPM-based BitLocker Drive Encryption\n#itm4n\n\nWhen I investigated CVE-2022-41099, a BitLocker Drive Encryption bypass through the Windows Recovery Environment (WinRE), the fact that the latter was able to transparently access an encrypted drive without requiring the recovery password struck me. My initial thought was that there had to be a way to reproduce this behavior and obtain the master key from the Recovery Environment (WinRE). The o...\n\nvia Itm4n Blog (author: itm4n)", "creation_timestamp": "2023-10-14T12:17:03.000000Z"}