Researchers from the Technical University of Berlin have discovered an exploit called faultTPM that can bypass security protections like BitLocker by exploiting a hardware bug in the firmware TPM (fTPM) of AMD Ryzen processors based on Zen 2 and 3 architectures.
However, the exploit requires physical access to the computer, which makes it unlikely for most users to be affected. The exploit involves a voltage fault injection attack that can access encrypted data in the fTPM, allowing attackers to bypass BitLocker protection.
The attack can only be executed by connecting a specific device that costs around $200 to the Platform Security Processor (PSP) present in Zen 2 and 3 chips.
As it is a hardware bug, it is difficult to solve, and the only solution would be to implement it in future architecture.