{"id":16473,"date":"2026-05-22T09:01:16","date_gmt":"2026-05-22T00:01:16","guid":{"rendered":"https:\/\/m365jp.net\/?p=16473"},"modified":"2026-05-22T09:08:51","modified_gmt":"2026-05-22T00:08:51","slug":"mc1318295-take-action-mitigation-guidance-updated-with-a-new-script-for-cve-2026-45585","status":"publish","type":"post","link":"https:\/\/m365jp.net\/index.php\/2026-05-22-mc1318295-take-action-mitigation-guidance-updated-with-a-new-script-for-cve-2026-45585","title":{"rendered":"MC1318295 | Take action: Mitigation guidance updated with a new script for CVE 2026 45585"},"content":{"rendered":"<div class=\"postie-post\">\n<div>\n<hr>\n<table id=\"section\">\n<tbody>\n<tr>\n<th width=\"95%\">MC1318295 | Take action: Mitigation guidance updated with a new script for CVE 2026 45585<\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr>\n<table id=\"data\">\n<tbody>\n<tr>\n<th>Classification<\/th>\n<td>preventOrFixIssue<\/td>\n<\/tr>\n<tr>\n<th>Last Updated<\/th>\n<td>05\/21\/2026 23:31:01<\/td>\n<\/tr>\n<tr>\n<th>Start Time<\/th>\n<td>05\/21\/2026 23:30:59<\/td>\n<\/tr>\n<tr>\n<th>End Time<\/th>\n<td>05\/21\/2027 23:30:59<\/td>\n<\/tr>\n<tr>\n<th>Message Content<\/th>\n<td>\n<div>Microsoft has updated the mitigation guidance in <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-45585\" rel=\"noopener noreferrer\" target=\"_blank\">  CVE-2026-45585<\/a>, a Windows BitLocker security feature bypass vulnerability. The updated guidance replaces previously documented manual mitigation steps with a  <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-45585#faq\" rel=\"noopener noreferrer\" target=\"_blank\">  script<\/a> that helps reduce exposure while a future security update is developed to address this vulnerability. Note that a limited set of Windows versions are affected: Windows 11, versions 26H1, 25H2, and 24H2, and Windows Server 2025.<\/div>\n<div>  <\/div>\n<div><b>When will this happen:<\/b><\/div>\n<div>The updated mitigation guidance and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-45585#faq\" rel=\"noopener noreferrer\" target=\"_blank\">  script<\/a> are available now.<\/div>\n<div>  <\/div>\n<div><b>How this will affect your organization:<\/b><\/div>\n<div>Windows devices that use BitLocker may be exposed to this vulnerability if mitigations are not applied. Organizational environments that previously implemented the documented manual mitigation steps do not need to take additional action, as the script   only simplifies deployment of the existing mitigation.<\/div>\n<div>  <\/div>\n<div>Organizations that have not yet taken action should assess their exposure to this vulnerability and determine whether mitigation is appropriate. Microsoft recommends that organizations consider implementing this mitigation if devices and data may be at   risk of being compromised or stolen. For example, this may apply if your organization\u2019s employees take their work devices home or on business travel.<\/div>\n<div><b>&nbsp;<\/b><\/div>\n<div><b>What you need to do to prepare:<\/b><\/div>\n<div>Organizational environments using BitLocker on affected Windows versions should review the updated guidance in the Microsoft Security Update Guide to determine whether applying the mitigation is necessary.<\/div>\n<div>  <\/div>\n<div><b>Additional information:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/b><\/div>\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-45585\" rel=\"noopener noreferrer\" target=\"_blank\">CVE-2026-45585: Windows BitLocker Security Feature Bypass Vulnerability<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<th>Machine Translation<\/th>\n<td>\n<div>Microsoft\u306f <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-45585\" rel=\"noopener noreferrer\" target=\"_blank\">  CVE-2026-45585<\/a>\u3068\u3044\u3046Windows BitLocker\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u56de\u907f\u8106\u5f31\u6027\u306e\u7de9\u548c\u30ac\u30a4\u30c0\u30f3\u30b9\u3092\u66f4\u65b0\u3057\u307e\u3057\u305f\u3002\u66f4\u65b0\u3055\u308c\u305f\u30ac\u30a4\u30c0\u30f3\u30b9\u3067\u306f\u3001\u3053\u308c\u307e\u3067\u306b\u6587\u66f8\u5316\u3055\u308c\u3066\u3044\u305f\u624b\u52d5\u306e\u7de9\u548c\u624b\u9806\u3092\u3001\u4eca\u5f8c\u3053\u306e\u8106\u5f31\u6027\u306b\u5bfe\u51e6\u3059\u308b\u305f\u3081\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u306e\u958b\u767a\u3092\u9032\u3081\u308b\u9593\u3001\u30ea\u30b9\u30af\u3092\u6e1b\u3089\u3059\u305f\u3081\u306e  <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-45585#faq\" rel=\"noopener noreferrer\" target=\"_blank\">  \u30b9\u30af\u30ea\u30d7\u30c8<\/a> \u306b\u7f6e\u304d\u63db\u3048\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u306a\u304a\u3001\u5f71\u97ff\u3092\u53d7\u3051\u308bWindows\u30d0\u30fc\u30b8\u30e7\u30f3\u306f\u9650\u3089\u308c\u3066\u3044\u307e\u3059:Windows 11\u3001\u30d0\u30fc\u30b8\u30e7\u30f326H1\u300125H2\u300124H2\u3001\u304a\u3088\u3073Windows Server 2025\u3067\u3059\u3002<\/div>\n<div>  <\/div>\n<div><b>\u3053\u308c\u306f\u3044\u3064\u5b9f\u73fe\u3057\u307e\u3059\u304b:<\/b><\/div>\n<div>\u66f4\u65b0\u3055\u308c\u305f\u7de9\u548c\u30ac\u30a4\u30c0\u30f3\u30b9\u3068 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-45585#faq\" rel=\"noopener noreferrer\" target=\"_blank\">  \u30b9\u30af\u30ea\u30d7\u30c8<\/a> \u306f\u73fe\u5728\u5165\u624b\u53ef\u80fd\u3067\u3059\u3002<\/div>\n<div>  <\/div>\n<div><b>\u3053\u308c\u304c\u3042\u306a\u305f\u306e\u7d44\u7e54\u306b\u3069\u306e\u3088\u3046\u306a\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u304b:<\/b><\/div>\n<div>BitLocker\u3092\u4f7f\u7528\u3059\u308bWindows\u30c7\u30d0\u30a4\u30b9\u306f\u3001\u7de9\u548c\u7b56\u3092\u9069\u7528\u3057\u306a\u3051\u308c\u3070\u3053\u306e\u8106\u5f31\u6027\u306b\u3055\u3089\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002\u4ee5\u524d\u306b\u6587\u66f8\u5316\u3055\u308c\u305f\u624b\u52d5\u7de9\u548c\u63aa\u7f6e\u3092\u5b9f\u88c5\u3057\u3066\u3044\u305f\u7d44\u7e54\u74b0\u5883\u306f\u3001\u30b9\u30af\u30ea\u30d7\u30c8\u304c\u65e2\u5b58\u306e\u7de9\u548c\u7b56\u306e\u5c55\u958b\u3092\u7c21\u7d20\u5316\u3059\u308b\u305f\u3081\u3001\u8ffd\u52a0\u306e\u63aa\u7f6e\u3092\u53d6\u308b\u5fc5\u8981\u306f\u3042\u308a\u307e\u305b\u3093\u3002<\/div>\n<div>  <\/div>\n<div>\u307e\u3060\u5bfe\u7b56\u3092\u8b1b\u3058\u3066\u3044\u306a\u3044\u7d44\u7e54\u306f\u3001\u3053\u306e\u8106\u5f31\u6027\u3078\u306e\u66dd\u9732\u72b6\u6cc1\u3092\u8a55\u4fa1\u3057\u3001\u7de9\u548c\u7b56\u304c\u9069\u5207\u304b\u3069\u3046\u304b\u3092\u5224\u65ad\u3059\u3079\u304d\u3067\u3059\u3002Microsoft\u306f\u3001\u30c7\u30d0\u30a4\u30b9\u3084\u30c7\u30fc\u30bf\u304c\u4fb5\u5bb3\u3084\u76d7\u96e3\u306e\u30ea\u30b9\u30af\u304c\u3042\u308b\u5834\u5408\u3001\u3053\u306e\u5bfe\u7b56\u306e\u5b9f\u65bd\u3092\u7d44\u7e54\u306b\u63a8\u5968\u3057\u3066\u3044\u307e\u3059\u3002\u4f8b\u3048\u3070\u3001\u7d44\u7e54\u306e\u5f93\u696d\u54e1\u304c\u8077\u5834\u306e\u30c7\u30d0\u30a4\u30b9\u3092\u81ea\u5b85\u3084\u51fa\u5f35\u6642\u306b\u6301\u3061\u5e30\u308b\u5834\u5408\u306b\u9069\u7528\u3055\u308c\u307e\u3059\u3002<\/div>\n<div><b>&nbsp;<\/b><\/div>\n<div><b>\u6e96\u5099\u306e\u305f\u3081\u306b\u3084\u308b\u3079\u304d\u3053\u3068:<\/b><\/div>\n<div>\u5f71\u97ff\u3092\u53d7\u3051\u305fWindows\u30d0\u30fc\u30b8\u30e7\u30f3\u3067BitLocker\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u7d44\u7e54\u74b0\u5883\u306f\u3001Microsoft Security Update Guide\u306e\u66f4\u65b0\u3055\u308c\u305f\u30ac\u30a4\u30c0\u30f3\u30b9\u3092\u78ba\u8a8d\u3057\u3001\u7de9\u548c\u7b56\u306e\u9069\u7528\u304c\u5fc5\u8981\u304b\u3069\u3046\u304b\u3092\u5224\u65ad\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/div>\n<div>  <\/div>\n<div><b>\u8ffd\u52a0\u60c5\u5831:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/b><\/div>\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2026-45585\" rel=\"noopener noreferrer\" target=\"_blank\">CVE-2026-45585:Windows BitLocker\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u306e\u56de\u907f\u8106\u5f31\u6027<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>MC1318295 | Take action: Mitigation guidance updated with a new script for CVE 2026 45585 Classification preve [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16473","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/16473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/comments?post=16473"}],"version-history":[{"count":0,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/posts\/16473\/revisions"}],"wp:attachment":[{"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/media?parent=16473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/categories?post=16473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/m365jp.net\/index.php\/wp-json\/wp\/v2\/tags?post=16473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}