Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10010: CWE-353 Missing Support for Integrity Check in CPSD IT SERVICES GMBH CryptoPro Secure Disk for BitLocker

0
Medium
VulnerabilityCVE-2025-10010cvecve-2025-10010cwe-353
Published: Tue Feb 24 2026 (02/24/2026, 14:13:29 UTC)
Source: CVE Database V5
Vendor/Project: CPSD IT SERVICES GMBH
Product: CryptoPro Secure Disk for BitLocker

Description

The CPSD CryptoPro Secure Disk application boots a small Linux operating system to perform user authentication before using BitLocker to decrypt the Windows partition. The system is located on a separate unencrypted partition which can be reached by anyone with access to the hard disk. Multiple checks are performed to validate the integrity of the Linux operating system and the CryptoPro Secure Disk application files. When files are changed an error is shown on system start. One of the checks is the Linux kernel's Integrity Measurement Architecture (IMA). It was identified that configuration files are not validated by the IMA and can then (if not checked by other measures) be changed. This allows an attacker to execute arbitrary code in the context of the root user and enables an attacker to e.g., plant a backdoor and access data during execution.

AI-Powered Analysis

AILast updated: 02/24/2026, 21:02:24 UTC

Technical Analysis

CVE-2025-10010 concerns a vulnerability in the CPSD CryptoPro Secure Disk for BitLocker, a security product that uses a small Linux-based operating system to authenticate users before unlocking a BitLocker-encrypted Windows partition. This Linux OS and the CryptoPro application reside on a separate, unencrypted partition accessible to anyone with physical access to the hard disk. The product implements multiple integrity checks, including the Linux kernel's Integrity Measurement Architecture (IMA), to detect unauthorized modifications to system files. However, it was discovered that configuration files are excluded from IMA validation, creating a gap in the integrity verification process. An attacker with physical access can modify these configuration files to execute arbitrary code with root privileges during system boot. This can facilitate planting persistent backdoors and unauthorized access to sensitive data during the decryption process. The vulnerability affects versions prior to 7.6.6 and 7.7.1 and does not require authentication or user interaction to exploit. The CVSS 3.1 base score is 6.8, reflecting the medium severity due to the requirement of physical access and the high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the risk remains significant given the elevated privileges gained upon exploitation.

Potential Impact

The vulnerability allows attackers with physical access to bypass critical integrity checks on the authentication environment that protects BitLocker-encrypted data. By modifying unvalidated configuration files, attackers can execute arbitrary code as root, potentially planting persistent backdoors and gaining full control over the system before Windows boots. This compromises the confidentiality and integrity of encrypted data, undermining the primary security guarantees of BitLocker. Organizations relying on CryptoPro Secure Disk for BitLocker to protect sensitive information face risks of data theft, unauthorized system access, and persistent compromise. The attack requires physical access, limiting remote exploitation but increasing risk in environments with shared or poorly secured hardware. The availability of the system can also be affected if malicious modifications disrupt the boot or authentication process. Overall, the vulnerability threatens the foundational trust model of disk encryption by compromising the pre-boot authentication environment.

Mitigation Recommendations

1. Immediately upgrade CryptoPro Secure Disk for BitLocker to versions 7.6.6 or later, where this vulnerability is addressed. 2. Implement strict physical security controls to prevent unauthorized access to devices, including locked server rooms, secure storage, and tamper-evident seals. 3. Employ full disk encryption solutions that include integrity protection for all pre-boot components, including configuration files. 4. Use hardware-based security modules (e.g., TPM with measured boot) to ensure the integrity of the boot environment beyond software checks. 5. Regularly audit and monitor system partitions for unauthorized changes, especially unencrypted partitions containing critical boot components. 6. Consider additional endpoint detection and response (EDR) solutions that can detect anomalous behavior indicative of pre-boot compromise. 7. Educate staff on the risks of physical access attacks and enforce policies to minimize exposure of sensitive hardware. 8. If patching is delayed, consider disabling CryptoPro Secure Disk or using alternative authentication methods that do not expose unencrypted partitions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2025-09-05T08:13:43.528Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699e0f3fbe58cf853b290da9

Added to database: 2/24/2026, 8:51:11 PM

Last enriched: 2/24/2026, 9:02:24 PM

Last updated: 2/24/2026, 11:25:26 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats