Settings

Theme

Tell HN: Latest Windows security update is locking all our computers

17 points by kmitz 3 years ago · 7 comments · 2 min read


It is a known issue : KB5012170 security update will lock the computer and show the bitlocker screen after a reboot. Apparently that's not the case for all configurations, but the bug has been encountered on Windows 8, 10 and 11.

We are a small startup with ~20 windows laptops, with recent hardware and legit licences. And since a few days it's chaos because everyone is having the bitlocker message and is not always able to find its recovery key (without the key you lose all your data). Because finding the key requires you to remember which email address you used to create your Microsoft account, and because for some reasons sometimes the key doesn't even show up on the account.

I'm the CTO in charge and I'm doing all the sys admin stuff myself, which is probably not a good idea as it appears now. Up to now I had never heard about bitlocker (I don't use windows myself). I guess that's the case for many small organizations or individuals. This bug is a ticking time bomb for all of them. I'm baffled to say the least, that such a scenario can even occur. It has caused more damage to us than any ransomware attacks.

I'd be interested to hear if some you have experienced this situation and how you dealt with it. Cheers

Genbox 3 years ago

BitLocker does validation of the Platform Configuration Register (PCR) in the Trusted Platform Module (TPM). It does this to prevent a whole slew of exploitation techniques.

PCR banks 0 to 7 have well-defined values, so an accumulator in the TPM hashes the values and BitLocker uses the values as part of the encryption key derivation algorithm. If the PCR hash changes, the BitLocker key will become invalid.

However, BitLocker can have several "protectors" as they are called. One that is enabled by default is a "Recovery Key" protector, which is not protected by the TPM. It is a 48 digit password that must either be printed, stored on a non-encrypted medium (like an USB device) or uploaded to an Azure AD or Microsoft account.

Your colleagues must have enabled BitLocker themselves, as it is not enabled by default. They must also have been through the "backup recovery key" process, as BitLocker requires manual user interaction for this part.

It sucks when there is an update to PCR banks - and usually the update won't install if PCR7 binding is enabled - but users that enable advanced security features also have part of the responsibility to ensure they don't get locked out of their own systems.

  • kmitzOP 3 years ago

    Thanks for the explanation. We bought the laptops from Dell, and after reading your message this is what I found on their website :

    "All computers that Dell currently ships are Modern Standby compliant and the above applies. A registry key that Dell leaves in a neutral state controls this behavior, neither prohibiting nor enforcing encryption. Windows interprets this as approval to encrypt." https://www.dell.com/support/kbdoc/fr-fr/000124361/bitlocker...

    So for the end-user bitlocker is enabled by default. It is obscure enough that our team missed that they had to backup something before using their computers.

  • colejohnson66 3 years ago

    OP seems to imply it’s affected their entire “fleet”. Genuine question: is it possible the OEM they bought from enabled it? Cause you’re right: if you enable BL, you have a responsibility to not lose your recovery key. But if it was, say, in the box that was thrown away, is it the user’s fault?

    • Nextgrid 3 years ago

      In general, at least one PCR will be extended with the hash of the EFI executable that's being run (with it being responsible for extending other PCRs with the hashes it executes, as to perpetuate the chain of trust). Without this, the whole system becomes pointless if you can load untrusted code (which can then set its own PCR values) without irrevocably messing up at least one PCR in the process.

      If the OS updates the EFI binary or the files the bootloader will load (and thus extend PCRs based off of), the OS is responsible to "seal" the keys with the (predicted) values of the PCRs corresponding to the new files.

      If the OS updates the files and fails to properly do this step, you get in this situation and your only way out is to use a backup key or somehow make the PCRs match what's actually being sealed (which is difficult, as the whole point is to prevent you from doing that - booting from a Linux USB or even merely changing BIOS settings or entering the boot menu will change PCR values) to make the TPM unseal the disk encryption key.

    • kmitzOP 3 years ago

      I confirm this was enabled by default. The laptop were shipped from Dell with Pro versions of Windows. The end-users did not go through bitlocker setup process and therefore were not aware that they had to backup their security key.

plasma 3 years ago

Not sure it’s helpful, but if you happen to use InTune / Endpoint Manager, recovery keys are accessible from there.

  • kmitzOP 3 years ago

    Thanks. I've never heard of these. I understand that's some computer fleet management solution. I guess that's not something enabled by default, so probably not an option for us.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection