Category
preventOrFixIssue
Severity
normal
Major change
True
Last modified
2026-05-21 23:31:01
Summary source
Azure OpenAI (gpt-4.1)
Action by (Graph)
—
Action by (AI)
2026-05-22 00:00:00
Services
Windows
Tags
Admin impact
Master tags
Admin, Security
Roadmap IDs
One-line summary
Microsoft released a script to simplify mitigation for a Windows BitLocker security bypass vulnerability affecting limited Windows 11 and Windows Server 2025 versions.
Similar updates
More like thisMC1192178 New Windows Autopatch reports on CVEs
New Windows Autopatch reports on CVEs A new Windows Autopatch CVEs report in Intune helps track remediated vulnerabilities, device risk status, and links to remediation steps for improved security management. A new Windows Autopatch report ... Additional information: New Windows Autopatch reports on CVEs Common Vulnerabilities and Exposures.
MC1111656 The July 2025 Windows security update is now available
The July 2025 Windows security update is now available The July 2025 security update for Windows 10, 11, and supported Windows Server versions is now available, including security and quality improvements; prompt installation is recommended. The July 2025 security update is now available for all supported versions of Windows. We recommend that.
MC1138549 Hotpatch readiness: Enable VBS at scale
Hotpatch readiness: Enable VBS at scale To use Windows Autopatch hotpatching (security updates without restart), you must enable virtualization-based security (VBS) on Windows clients using Intune, PowerShell, or Command Prompt. Prepare for hotpatch in your environment by meeting a key requirement to enable virtualization-based security (VBS) on.
MC1178653 Take Action: Out-of-band update to address a vulnerability in Windows Server Update Services (WSUS)
Take Action: Out-of-band update to address a vulnerability in Windows Server Update Services (WSUS) A critical RCE vulnerability in WSUS reporting web service is fixed by an out-of-band Windows Server update released on 2025-10-23; immediate installation is recommended. Microsoft has identified a remote code execution (RCE) vulnerability in the.
MC1081492 (Updated) Take Action: Out-of-band update to address issue on devices running Hyper-V on some versions of Windows
(Updated) Take Action: Out-of-band update to address issue on devices running Hyper-V on some versions of Windows OOB updates released to fix confidential Hyper-V VM issues causing unexpected restarts; affected admins should apply the update from the Microsoft Update Catalog. Updated May 27, 2025: This message was updated to include additional.
Details
Body (from Message Center)
Microsoft has updated the mitigation guidance in CVE-2026-45585, a Windows BitLocker security feature bypass vulnerability. The updated guidance replaces previously documented manual mitigation steps with a script that helps reduce exposure while a future security update is developed to address this vulnerability. Note that a limited set of Windows versions are affected: Windows 11, versions 26H1, 25H2, and 24H2, and Windows Server 2025.
When will this happen:
The updated mitigation guidance and script are available now.
How this will affect your organization:
Windows devices that use BitLocker may be exposed to this vulnerability if mitigations are not applied. Organizational environments that previously implemented the documented manual mitigation steps do not need to take additional action, as the script only simplifies deployment of the existing mitigation.
Organizations that have not yet taken action should assess their exposure to this vulnerability and determine whether mitigation is appropriate. Microsoft recommends that organizations consider implementing this mitigation if devices and data may be at risk of being compromised or stolen. For example, this may apply if your organization’s employees take their work devices home or on business travel.
What you need to do to prepare:
Organizational environments using BitLocker on affected Windows versions should review the updated guidance in the Microsoft Security Update Guide to determine whether applying the mitigation is necessary.
Additional information:
Raw JSON (for debugging)
Expand/collapse the full payload below.
Show/hide raw
{
"snapshot_item": {
"action_required_by": null,
"ai_action_required_by": "2026-05-22T00:00:00Z",
"ai_actions": [
"Review updated mitigation guidance",
"Assess exposure to vulnerability",
"Implement script mitigation if needed"
],
"ai_master_tags": [
"Admin",
"Security"
],
"ai_model": "gpt-4.1",
"ai_summary": "Microsoft released a script to simplify mitigation for a Windows BitLocker security bypass vulnerability affecting limited Windows 11 and Windows Server 2025 versions.",
"ai_topics": [
"Windows"
],
"category": "preventOrFixIssue",
"details_map": {},
"id": "MC1318295",
"importance": 5,
"is_major_change": true,
"last_modified": "2026-05-21T23:31:01Z",
"ms_products": [
"Windows"
],
"platforms": null,
"roadmap_ids": [],
"services": [
"Windows"
],
"severity": "normal",
"tags": [
"Admin impact"
],
"title": "Take action: Mitigation guidance updated with a new script for CVE 2026 45585"
}
}