Windows Recovery Environment BitLocker Bypass (KB5025175)

medium Nessus Plugin ID 174991


The remote Windows host may be affected by a security feature bypass vulnerability.


The remote Windows host has not had the post-update scripts described in Microsoft KB5025175 executed. It may, therefore, be affected by a BitLocker security feature bypass vulnerability if the Windows Recovery Environment (WinRE) has not been update by an alternative method.

Note that Nessus has not tested for these issues but has instead relied only on the absence of breadcrumbs placed on the system by the remediation script.


Run the update scripts as described in KB5025175

See Also

Plugin Details

Severity: Medium

ID: 174991

File Name: smb_nt_ms23_mar_5025175_winre.nasl

Version: 1.3

Type: local

Agent: windows

Published: 5/2/2023

Updated: 6/21/2023

Configuration: Enable paranoid mode

Risk Information


Risk Factor: Medium

Score: 6.1


Risk Factor: Medium

Base Score: 4.9

Temporal Score: 4

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2022-41099


Risk Factor: Medium

Base Score: 4.6

Temporal Score: 4.3

Vector: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: Settings/ParanoidReport, SMB/Registry/Enumerated, SMB/WindowsVersionBuild

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/16/2023

Vulnerability Publication Date: 11/8/2022

Reference Information

CVE: CVE-2022-41099

MSFT: MS23-5025175

MSKB: 5025175