{"@odata.context":"https://api.msrc.microsoft.com/sug/v2.0/sugodata/v2.0/en-US/$metadata#vulnerability/$entity","id":"00000000-0000-0000-0000-0000df9b9e36","releaseDate":"2026-05-19T07:00:00-07:00","cveNumber":"CVE-2026-45585","cveTitle":"Windows BitLocker Security Feature Bypass Vulnerability","releaseNumber":"2026-May","vulnType":"Security Vulnerability","latestRevisionDate":"2026-05-21T07:00:00-07:00","description":"<p>Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as &quot;YellowKey&quot;. The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices.</p>\n<p>We are issuing this CVE to provide mitigation guidance that can be implemented to protect against this vulnerability until the security update is made available.</p>\n<p><strong>Mitigation FAQs</strong></p>\n<p><strong>Should I leverage the temporary mitigation?</strong></p>\n<p>Microsoft recommends that you consider implementing these mitigations if you are concerned your devices and data are at risk of being compromised or stolen. For example, if your organization\u2019s employees take their work devices home or on business travel.</p>\n<p><strong>What impact to service availability/management could be caused by implementing the mitigations?</strong></p>\n<p>Implementing these mitigations will not impact service availability or management operations.</p>\n<p><strong>Do customers need to revert the changes made to mitigate the vulnerability once the security update to protect against this vulnerability is available?</strong></p>\n<p>No. The security update will maintain the mitigation's behavior once the security update is installed.</p>\n<p><strong>I am using TPM+PIN, am I at risk of this vulnerability being exploited</strong></p>\n<p>No, if you are using TPM+PIN the vulnerability is not exploitable.</p>\n","cweList":["CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')"],"cweDetailsListForSearch":["cwe: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')","cweUrl: https://cwe.mitre.org/data/definitions/77.html"],"unformattedDescription":"Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as \"YellowKey\". The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices.\n \nWe are issuing this CVE to provide mitigation guidance that can be implemented to protect against this vulnerability until the security update is made available. \n\n**Mitigation FAQs**\n\n**Should I leverage the temporary mitigation?**\n\nMicrosoft recommends that you consider implementing these mitigations if you are concerned your devices and data are at risk of being compromised or stolen. For example, if your organization\u2019s employees take their work devices home or on business travel.\n\n**What impact to service availability/management could be caused by implementing the mitigations?**\n\nImplementing these mitigations will not impact service availability or management operations.\n \n**Do customers need to revert the changes made to mitigate the vulnerability once the security update to protect against this vulnerability is available?**\n\nNo. The security update will maintain the mitigation's behavior once the security update is installed.  \n\n**I am using TPM+PIN, am I at risk of this vulnerability being exploited**\n\nNo, if you are using TPM+PIN the vulnerability is not exploitable.","mitreText":"CVE-2026-45585","mitreUrl":"https://www.cve.org/CVERecord?id=CVE-2026-45585","publiclyDisclosed":"Yes","exploited":"No","latestSoftwareReleaseId":1,"latestSoftwareRelease":"Exploitation More Likely","olderSoftwareReleaseId":0,"denialOfService":"N/A","tag":"Windows BitLocker","issuingCna":"Microsoft","issuingCnaId":100000001,"severityId":100000001,"severity":"Important","impactId":100000007,"impact":"Security Feature Bypass","langCode":"en-US","baseScore":"6.8","temporalScore":"6.3","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:W/RC:C","vectorStringSource":"Microsoft","isMariner":false,"customerActionRequired":true,"customerActionRequiredId":1,"cweDetailsList":[{"keys":["cwe","cweUrl"],"values":["CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')","https://cwe.mitre.org/data/definitions/77.html"]}],"articles":[{"title":"Windows BitLocker Security Feature Bypass Vulnerability","articleType":"100000000","description":"<p>Improper neutralization of special elements used in a command ('command injection') in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.</p>\n","ordinal":10000},{"articleType":"FAQ","description":"<p><strong>What kind of security feature could be bypassed by successfully exploiting this vulnerability?</strong></p>\n<p>A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.</p>\n","ordinal":10000},{"articleType":"FAQ","description":"<p><strong>Is there a script that I can copy and paste to implement a mitigation?</strong></p>\n<p>Yes. This script is an interim security fix that helps to reduce the risk of exploitation of the vulnerability.</p>\n<p>The script is for WinRE and removes autofstx.exe from the BootExecute registry value. Since BootExecute runs programs very early in boot (even in recovery mode), removing this entry prevents that executable from running in a high\u2011privilege environment, reducing risk.</p>\n<p>It works by mounting the WinRE image, editing its offline SYSTEM registry to remove the entry if present, then safely committing changes and re\u2011sealing WinRE so BitLocker trust remains intact.</p>\n<p>It\u2019s designed to be safe\u2014if the autofstx.exe entry isn\u2019t there, it exits without making changes.</p>\n<pre><code class=\"language-&lt;#\">.SYNOPSIS\n    Removes autofstx.exe from the WinRE BootExecute registry value.\n\n.DESCRIPTION\n    This remediation script removes the &quot;autofstx.exe&quot; entry from the BootExecute\n    REG_MULTI_SZ value inside the Windows Recovery Environment (WinRE) offline\n    SYSTEM registry hive. This is a security fix to prevent autofstx.exe from\n    executing during WinRE boot.\n\n    The script performs the following steps:\n      1. Verify administrator privileges\n      2. Verify WinRE is enabled\n      3. Mount the WinRE image via reagentc\n      4. Load the offline SYSTEM registry hive\n      5. Read BootExecute and remove autofstx.exe if present\n      6. Unload the offline hive\n      7. Unmount the WinRE image with commit\n      8. Disable and re-enable WinRE to re-seal BitLocker trust chain\n\n    Exit 0 = Success (entry removed or not present)\n    Exit 1 = Failure (error during remediation)\n\n.PARAMETER MountPath\n    Directory to use as the WinRE mount point. Created if it does not exist.\n    Default: C:\\Mount\n\n.EXAMPLE\n    # Standard run\n    .\\Remove-AutoFsTxFromWinRE.ps1\n\n.EXAMPLE\n    # Custom mount path\n    .\\Remove-AutoFsTxFromWinRE.ps1 -MountPath D:\\mount\n\n.NOTES\n    Requirements: Windows with WinRE and reagentc support, Administrator privileges.\n    The WinRE disable/enable cycle at the end is required to re-seal the\n    BitLocker measurement chain after modifying the WinRE image.\n\n    THE SOFTWARE IS PROVIDED &quot;AS IS&quot;, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\n    IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\n    FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\n    AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\n    LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\n    OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\n    SOFTWARE.\n#&gt;\nparam(\n    [Parameter(Mandatory = $false)]\n    [string]$MountPath = &quot;C:\\Mount&quot;\n)\n\n# Target entry to remove from BootExecute\n$EntryToRemove = &quot;autofstx.exe&quot;\n\n# Internal constant for the offline hive key name\n$HiveName = &quot;WinREHive&quot;\n\n# State tracking for cleanup\n$hiveLoaded   = $false\n$imageMounted = $false\n$mountCreated = $false\n$changesMade  = $false\n\nWrite-Host &quot;Remove autofstx.exe from WinRE BootExecute&quot;\n\n# 1. Verify Administrator Privileges\n# PS Version: All | Admin: Yes | System Requirements: None\ntry {\n    $identity  = [Security.Principal.WindowsIdentity]::GetCurrent()\n    $principal = [Security.Principal.WindowsPrincipal]$identity\n    $isAdmin   = $principal.IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)\n\n    if (-not $isAdmin) {\n        Write-Host &quot;[1/8] Administrator check: FAILED&quot; -ForegroundColor Red\n        Write-Host &quot;  This script must be run as Administrator.&quot;\n        Write-Host &quot;  Right-click PowerShell and select 'Run as administrator'.&quot;\n        exit 1\n    }\n\n    Write-Host &quot;[1/8] Administrator check: Passed&quot; -ForegroundColor Green\n} catch {\n    Write-Warning &quot;Error checking administrator privileges: $_&quot;\n    exit 1\n}\n\n# 2. Check WinRE Status\n# PS Version: All | Admin: Yes | System Requirements: reagentc.exe\ntry {\n    $winreOutput = &amp; reagentc /info 2&gt;&amp;1\n    if ($LASTEXITCODE -ne 0) {\n        Write-Host &quot;[2/8] WinRE status check: FAILED&quot; -ForegroundColor Red\n        Write-Warning &quot;reagentc /info returned exit code $LASTEXITCODE&quot;\n        exit 1\n    }\n    $winreOutputStr = $winreOutput -join &quot;`n&quot;\n\n    if ($winreOutputStr -notmatch &quot;Windows RE status:\\s+Enabled&quot;) {\n        Write-Host &quot;[2/8] WinRE status: NOT ENABLED. Exiting.&quot; -ForegroundColor Green\n        exit 0\n    }\n\n    Write-Host &quot;[2/8] WinRE status: Enabled&quot; -ForegroundColor Green\n} catch {\n    Write-Warning &quot;Error checking WinRE status: $_&quot;\n    exit 1\n}\n\n# 3. Mount WinRE Image\n# PS Version: All | Admin: Yes | System Requirements: reagentc.exe\ntry {\n    if (-not (Test-Path $MountPath)) {\n        New-Item -ItemType Directory -Path $MountPath -Force | Out-Null\n        $mountCreated = $true\n        Write-Host &quot;[3/8] Created mount directory: $MountPath&quot;\n    } else {\n        $existing = Get-ChildItem -Path $MountPath -Force -ErrorAction SilentlyContinue\n        if ($existing) {\n            Write-Host &quot;[3/8] Mount WinRE image: FAILED&quot; -ForegroundColor Red\n            Write-Host &quot;  Mount directory $MountPath is not empty.&quot;\n            Write-Host &quot;  Clean it or specify a different -MountPath.&quot;\n            exit 1\n        }\n    }\n\n    $mountOutput = &amp; reagentc /mountre /path $MountPath 2&gt;&amp;1\n    if ($LASTEXITCODE -ne 0) {\n        Write-Host &quot;[3/8] Mount WinRE image: FAILED&quot; -ForegroundColor Red\n        Write-Warning &quot;reagentc /mountre output: $mountOutput&quot;\n        exit 1\n    }\n\n    $imageMounted = $true\n    Write-Host &quot;[3/8] WinRE image mounted: $MountPath&quot; -ForegroundColor Green\n} catch {\n    Write-Warning &quot;Error mounting WinRE image: $_&quot;\n    exit 1\n}\n\n# 4. Load Offline SYSTEM Registry Hive\n# PS Version: All | Admin: Yes | System Requirements: reg.exe\ntry {\n    # Locate the SYSTEM hive in the mounted WinRE image\n    $hivePath = $null\n    $hiveCandidates = @(\n        &quot;$MountPath\\Windows\\System32\\config\\SYSTEM&quot;,\n        &quot;$MountPath\\windows\\system32\\config\\SYSTEM&quot;\n    )\n\n    foreach ($candidate in $hiveCandidates) {\n        if (Test-Path $candidate) {\n            $hivePath = $candidate\n            break\n        }\n    }\n\n    if (-not $hivePath) {\n        # Broader search as fallback\n        $found = Get-ChildItem -Path $MountPath -Recurse -Filter &quot;SYSTEM&quot; -ErrorAction SilentlyContinue |\n                 Where-Object { $_.FullName -match &quot;config\\\\SYSTEM$&quot; } |\n                 Select-Object -First 1\n\n        if ($found) {\n            $hivePath = $found.FullName\n        }\n    }\n\n    if (-not $hivePath) {\n        Write-Host &quot;[4/8] Load offline hive: FAILED&quot; -ForegroundColor Red\n        Write-Warning &quot;Cannot locate SYSTEM hive in mounted WinRE image.&quot;\n\n        # Cleanup: unmount with discard\n        $null = &amp; reagentc /unmountre /path $MountPath /discard 2&gt;&amp;1\n        $imageMounted = $false\n        exit 1\n    }\n\n    Write-Host &quot;[4/8] Found SYSTEM hive: $hivePath&quot;\n\n    $loadOutput = &amp; reg load &quot;HKLM\\$HiveName&quot; $hivePath 2&gt;&amp;1\n    if ($LASTEXITCODE -ne 0) {\n        Write-Host &quot;[4/8] Load offline hive: FAILED&quot; -ForegroundColor Red\n        Write-Warning &quot;reg load output: $loadOutput&quot;\n\n        # Cleanup: unmount with discard\n        $null = &amp; reagentc /unmountre /path $MountPath /discard 2&gt;&amp;1\n        $imageMounted = $false\n        exit 1\n    }\n\n    $hiveLoaded = $true\n    Write-Host &quot;[4/8] Hive loaded as HKLM\\$HiveName&quot; -ForegroundColor Green\n} catch {\n    Write-Warning &quot;Error loading offline hive: $_&quot;\n\n    if ($imageMounted) {\n        $null = &amp; reagentc /unmountre /path $MountPath /discard 2&gt;&amp;1\n        $imageMounted = $false\n    }\n    exit 1\n}\n\n# 5. Read BootExecute and Remove autofstx.exe\n# PS Version: All | Admin: Yes | System Requirements: None\ntry {\n    # Determine active ControlSets from Select key\n    $selectPath = &quot;Registry::HKEY_LOCAL_MACHINE\\$HiveName\\Select&quot;\n    $selectProps = Get-ItemProperty -Path $selectPath -ErrorAction SilentlyContinue\n\n    if ($selectProps -and $selectProps.Current) {\n        $csNumbers = @($selectProps.Current)\n        if ($selectProps.Default -and $selectProps.Default -ne $selectProps.Current) {\n            $csNumbers += $selectProps.Default\n        }\n        $controlSets = $csNumbers | ForEach-Object { &quot;ControlSet{0:D3}&quot; -f [int]$_ }\n        Write-Host &quot;[5/8] Active ControlSets (from Select key): $($controlSets -join ', ')&quot;\n    } else {\n        $controlSets = @(&quot;ControlSet001&quot;)\n        Write-Host &quot;[5/8] Select key not readable, falling back to ControlSet001&quot;\n    }\n\n    # Remediate all relevant ControlSets\n    $foundEntry = $false\n\n    foreach ($cs in $controlSets) {\n        $regPath = &quot;Registry::HKEY_LOCAL_MACHINE\\$HiveName\\$cs\\Control\\Session Manager&quot;\n        $testResult = Get-ItemProperty -Path $regPath -Name &quot;BootExecute&quot; -ErrorAction SilentlyContinue\n\n        if (-not $testResult) {\n            Write-Host &quot;  $cs\\Session Manager\\BootExecute: not found, skipping&quot;\n            continue\n        }\n\n        $currentValue = $testResult.BootExecute\n\n        if (-not $currentValue) {\n            Write-Host &quot;  $cs BootExecute: (empty)&quot;\n            continue\n        }\n\n        # Remove matching entry (case-insensitive)\n        $updatedValue = @($currentValue | Where-Object {\n            $_ -and\n            ($_ -ne $EntryToRemove) -and\n            ($_ -notmatch &quot;^\\s*$([regex]::Escape($EntryToRemove))\\s*$&quot;)\n        })\n\n        if ($updatedValue.Count -eq @($currentValue).Count) {\n            Write-Host &quot;  $cs BootExecute: '$EntryToRemove' not present&quot;\n            continue\n        }\n\n        # Write updated REG_MULTI_SZ back\n        Set-ItemProperty -Path $regPath -Name &quot;BootExecute&quot; -Value $updatedValue\n        $foundEntry = $true\n\n        Write-Host &quot;  $cs BootExecute: removed '$EntryToRemove'&quot; -ForegroundColor Green\n\n        # Verify the write\n        $verifyValue = (Get-ItemProperty -Path $regPath -Name &quot;BootExecute&quot; -ErrorAction Stop).BootExecute\n        Write-Host &quot;  $cs verification: $($verifyValue -join '; ')&quot;\n    }\n\n    if (-not $foundEntry) {\n        Write-Host &quot;[5/8] '$EntryToRemove' not found in any active ControlSet. No changes needed.&quot; -ForegroundColor Green\n\n        # Cleanup: unload hive, unmount with discard\n        [gc]::Collect()\n        Start-Sleep -Seconds 1\n        $null = &amp; reg unload &quot;HKLM\\$HiveName&quot; 2&gt;&amp;1\n        $hiveLoaded = $false\n        $null = &amp; reagentc /unmountre /path $MountPath /discard 2&gt;&amp;1\n        $imageMounted = $false\n        if ($mountCreated) { Remove-Item -Path $MountPath -Recurse -Force -ErrorAction SilentlyContinue }\n        exit 0\n    }\n\n    $changesMade = $true\n    Write-Host &quot;[5/8] Removed '$EntryToRemove' from BootExecute&quot; -ForegroundColor Green\n} catch {\n    Write-Warning &quot;Error modifying BootExecute: $_&quot;\n\n    # Cleanup: unload hive, unmount with discard\n    [gc]::Collect()\n    Start-Sleep -Seconds 2\n    if ($hiveLoaded) {\n        $null = &amp; reg unload &quot;HKLM\\$HiveName&quot; 2&gt;&amp;1\n        $hiveLoaded = $false\n    }\n    if ($imageMounted) {\n        $null = &amp; reagentc /unmountre /path $MountPath /discard 2&gt;&amp;1\n        $imageMounted = $false\n    }\n    exit 1\n}\n\n# 6. Unload Offline Registry Hive\n# PS Version: All | Admin: Yes | System Requirements: reg.exe\ntry {\n    [gc]::Collect()\n    Start-Sleep -Seconds 2\n\n    $unloadOutput = &amp; reg unload &quot;HKLM\\$HiveName&quot; 2&gt;&amp;1\n    if ($LASTEXITCODE -ne 0) {\n        Write-Warning &quot;First unload attempt failed, retrying...&quot;\n        [gc]::Collect()\n        Start-Sleep -Seconds 3\n        $unloadOutput = &amp; reg unload &quot;HKLM\\$HiveName&quot; 2&gt;&amp;1\n        if ($LASTEXITCODE -ne 0) {\n            Write-Host &quot;[6/8] Unload hive: FAILED&quot; -ForegroundColor Red\n            Write-Warning &quot;reg unload output: $unloadOutput&quot;\n            Write-Host &quot;  Close any Registry Editor windows and retry.&quot;\n\n            # Try to unmount with discard to avoid leaving image mounted\n            $null = &amp; reagentc /unmountre /path $MountPath /discard 2&gt;&amp;1\n            $imageMounted = $false\n            exit 1\n        }\n    }\n\n    $hiveLoaded = $false\n    Write-Host &quot;[6/8] Offline hive unloaded&quot; -ForegroundColor Green\n} catch {\n    Write-Warning &quot;Error unloading hive: $_&quot;\n\n    $null = &amp; reagentc /unmountre /path $MountPath /discard 2&gt;&amp;1\n    $imageMounted = $false\n    exit 1\n}\n\n# 7. Unmount WinRE Image with Commit\n# PS Version: All | Admin: Yes | System Requirements: reagentc.exe\ntry {\n    if ($changesMade) {\n        $unmountOutput = &amp; reagentc /unmountre /path $MountPath /commit 2&gt;&amp;1\n    } else {\n        $unmountOutput = &amp; reagentc /unmountre /path $MountPath /discard 2&gt;&amp;1\n    }\n\n    if ($LASTEXITCODE -ne 0) {\n        Write-Host &quot;[7/8] Unmount WinRE: FAILED&quot; -ForegroundColor Red\n        Write-Warning &quot;reagentc /unmountre output: $unmountOutput&quot;\n\n        # Attempt discard as fallback\n        if ($changesMade) {\n            Write-Host &quot;  Attempting discard to avoid leaving image in broken state...&quot;\n            $null = &amp; reagentc /unmountre /path $MountPath /discard 2&gt;&amp;1\n        }\n        $imageMounted = $false\n        exit 1\n    }\n\n    $imageMounted = $false\n\n    if ($changesMade) {\n        Write-Host &quot;[7/8] WinRE image unmounted and committed&quot; -ForegroundColor Green\n    } else {\n        Write-Host &quot;[7/8] WinRE image unmounted (no changes)&quot; -ForegroundColor Green\n    }\n} catch {\n    Write-Warning &quot;Error unmounting WinRE image: $_&quot;\n    exit 1\n}\n\n# 8. Re-seal WinRE (Disable + Enable Cycle for BitLocker Trust Chain)\n# PS Version: All | Admin: Yes | System Requirements: reagentc.exe, BitLocker\ntry {\n    if (-not $changesMade) {\n        Write-Host &quot;[8/8] Re-seal WinRE: Skipped (no changes made)&quot; -ForegroundColor Green\n    } else {\n        $disableOutput = &amp; reagentc /disable 2&gt;&amp;1\n        if ($LASTEXITCODE -ne 0) {\n            Write-Warning &quot;reagentc /disable returned non-zero: $disableOutput&quot;\n        } else {\n            Write-Host &quot;  WinRE disabled.&quot;\n        }\n\n        $enableOutput = &amp; reagentc /enable 2&gt;&amp;1\n        if ($LASTEXITCODE -ne 0) {\n            Write-Host &quot;[8/8] Re-seal WinRE: FAILED&quot; -ForegroundColor Red\n            Write-Warning &quot;reagentc /enable output: $enableOutput&quot;\n            Write-Host &quot;  WinRE may need manual recovery. Run: reagentc /enable&quot;\n            exit 1\n        }\n\n        Write-Host &quot;[8/8] WinRE re-sealed (disable + enable cycle)&quot; -ForegroundColor Green\n    }\n} catch {\n    Write-Warning &quot;Error during WinRE re-seal: $_&quot;\n    Write-Host &quot;  Run manually: reagentc /enable&quot;\n    exit 1\n}\n\nWrite-Host &quot;&quot;\nWrite-Host &quot;  COMPLETE: '$EntryToRemove' removed from WinRE BootExecute&quot; -ForegroundColor Green\n\n# Cleanup: remove mount directory if we created it\nif ($mountCreated -and (Test-Path $MountPath)) {\n    Remove-Item -Path $MountPath -Recurse -Force -ErrorAction SilentlyContinue\n}\n\nexit 0```\n</code></pre>\n","ordinal":10000}],"revisions":[{"cveNumber":"CVE-2026-45585","version":1,"revisionDate":"2026-05-19T07:00:00-07:00","initialDate":"0001-01-01T00:00:00Z","description":"<p>Information published.</p>\n","unformattedDescription":"Information published.","notificationNeeded":true,"notificationSent":false,"sourceId":"523f460e-1553-f111-93fb-000d3afbc7d7"},{"cveNumber":"CVE-2026-45585","version":1.1,"revisionDate":"2026-05-20T07:00:00-07:00","initialDate":"0001-01-01T00:00:00Z","description":"<p>Updated <strong>Step 2</strong> of the first mitigation. This is an informational change only.</p>\n","unformattedDescription":"Updated **Step 2** of the first mitigation. This is an informational change only.","notificationNeeded":false,"notificationSent":false,"sourceId":"a406e2ea-ab54-f111-93fb-000d3afbc7d7"},{"cveNumber":"CVE-2026-45585","version":1.2,"revisionDate":"2026-05-21T07:00:00-07:00","initialDate":"0001-01-01T00:00:00Z","description":"<p>Added a script to implement a mitigation and removed the manual mitigations. Please read the information to decide if you need to run the provided script.</p>\n","unformattedDescription":"Added a script to implement a mitigation and removed the manual mitigations. Please read the information to decide if you need to run the provided script.","notificationNeeded":true,"notificationSent":false,"sourceId":"096289f1-d654-f111-93fb-000d3afbc7d7"}]}