Dear Bogdan,
Thank you for reaching out to the Microsoft Q&A.
The answer is Yes, there are Microsoft-recommended methods to fully mitigate this attack vector by hardening the Windows Recovery Environment (WinRE), which is the entry point for this specific exploit. The core strategy is to prevent unauthorized access to the recovery command prompt.
The vulnerability you described hinges on an attacker's ability to boot into WinRE and access the main operating system partition (C:
) without any authentication. While BitLocker is the primary defense, its effectiveness depends on its configuration.
- Enhance BitLocker with Pre-Boot Authentication:
- This is the most effective and recommended solution. The attack you described is often only possible when BitLocker uses the "TPM-only" protector. By adding a second authentication factor before the OS loads, the drive remains encrypted and inaccessible from WinRE without the recovery key.
- When an attacker boots into WinRE, the system's OS drive (
C:
) will not be automatically unlocked. To access it and modifyutilman.exe
, they would first need to provide the BitLocker Recovery Key, which they do not have. This completely shuts down the attack vector. - You can able this via Group Policy (Press Windows + R, type
gpedit.msc
> Enter) - You can configure this under: Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives > Require additional authentication at startup
- By enabling this policy and choosing a PIN or startup key, you ensure the drive's contents are protected even from the pre-boot WinRE environment.
- Disable the Windows Recovery Environment (WinRE):
- This is a more drastic but highly effective measure. If WinRE doesn't exist, it cannot be used for an attack. The
reagentc.exe
tool is used to manage WinRE. Disabling it removes theWinre.wim
file and its boot configuration. Attempting to boot into recovery will simply fail. - Press Windows + X, select Terminal (Admin), then run this command:
reagentc /disable
- However, you will lose all automatic repair and easy access to troubleshooting tools. To recover or troubleshoot the system, you will need to use bootable Windows installation media (USB/DVD). You can always re-enable it later with
reagentc /enable
.
- This is a more drastic but highly effective measure. If WinRE doesn't exist, it cannot be used for an attack. The
To assist others who might have similar questions and to help us improve our support system, we kindly encourage you to "Accept the answer" if it successfully addressed your concern. Accepting an answer lets other users know that this solution worked for you, and it also helps us track the effectiveness of our support efforts.
Best regards,
Bryan Vu | Microsoft Q&A Support Specialist