Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10010: CWE-353 Missing Support for Integrity Check in CPSD IT SERVICES GMBH CryptoPro Secure Disk for BitLocker

0
Medium
VulnerabilityCVE-2025-10010cvecve-2025-10010cwe-353
Published: Tue Feb 24 2026 (02/24/2026, 14:13:29 UTC)
Source: CVE Database V5
Vendor/Project: CPSD IT SERVICES GMBH
Product: CryptoPro Secure Disk for BitLocker

Description

The CPSD CryptoPro Secure Disk application boots a small Linux operating system to perform user authentication before using BitLocker to decrypt the Windows partition. The system is located on a separate unencrypted partition which can be reached by anyone with access to the hard disk. Multiple checks are performed to validate the integrity of the Linux operating system and the CryptoPro Secure Disk application files. When files are changed an error is shown on system start. One of the checks is the Linux kernel's Integrity Measurement Architecture (IMA). It was identified that configuration files are not validated by the IMA and can then (if not checked by other measures) be changed. This allows an attacker to execute arbitrary code in the context of the root user and enables an attacker to e.g., plant a backdoor and access data during execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/13/2026, 18:59:53 UTC

Technical Analysis

CVE-2025-10010 identifies a security weakness in the CryptoPro Secure Disk for BitLocker product by CPSD IT SERVICES GMBH. This product enhances BitLocker by booting a small Linux-based OS to authenticate users before decrypting the Windows partition. The Linux OS and application files reside on a separate, unencrypted partition accessible to anyone with physical access to the device. The product uses multiple integrity checks, including the Linux kernel's Integrity Measurement Architecture (IMA), to detect tampering with system files. However, configuration files are not covered by IMA checks and can be modified without detection. An attacker with physical access can alter these configuration files to execute arbitrary code with root privileges during the boot process. This can enable planting persistent backdoors, compromising the confidentiality, integrity, and availability of the encrypted data once BitLocker unlocks the Windows partition. The vulnerability affects versions earlier than 7.6.6 and 7.7.1, with no patches currently linked. The CVSS 3.1 score of 6.8 reflects a medium severity due to the requirement of physical access but the high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability poses a significant risk in environments where physical security is weak or devices are exposed to untrusted individuals.

Potential Impact

The vulnerability allows attackers with physical access to bypass critical integrity protections by modifying unencrypted configuration files, leading to arbitrary root code execution during the pre-boot authentication phase. This compromises the security guarantees of BitLocker encryption by enabling attackers to plant backdoors or malware that can access decrypted data once the system boots. The impact includes full compromise of data confidentiality, integrity, and availability on affected systems. Organizations relying on CryptoPro Secure Disk for BitLocker in high-security environments, such as government, finance, or critical infrastructure, face increased risk of data breaches and persistent compromise. The attack requires physical access but no authentication or user interaction, making it particularly dangerous in scenarios where devices are lost, stolen, or accessible to insiders. The lack of integrity checks on configuration files undermines the trustworthiness of the entire pre-boot authentication process.

Mitigation Recommendations

1. Apply vendor patches or updates as soon as they become available for versions prior to 7.6.6 and 7.7.1 to ensure configuration files are included in integrity checks. 2. Implement strict physical security controls to prevent unauthorized access to devices, including secure storage, tamper-evident seals, and device tracking. 3. Use full disk encryption solutions that protect all partitions, including those containing pre-boot environments, or ensure the pre-boot partition is encrypted or integrity-protected. 4. Regularly audit and monitor device integrity using hardware-based security modules or trusted platform modules (TPMs) to detect unauthorized changes. 5. Employ endpoint detection and response (EDR) tools capable of identifying unusual boot-time behaviors or root-level code execution. 6. Educate users and administrators about the risks of physical access attacks and enforce policies for device handling and loss reporting. 7. Consider multi-factor authentication mechanisms that do not rely solely on pre-boot Linux OS authentication to reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2025-09-05T08:13:43.528Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699e0f3fbe58cf853b290da9

Added to database: 2/24/2026, 8:51:11 PM

Last enriched: 3/13/2026, 6:59:53 PM

Last updated: 4/9/2026, 5:29:32 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses