Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4382: Missing Authentication for Critical Function

0
Medium
VulnerabilityCVE-2025-4382cvecve-2025-4382
Published: Fri May 09 2025 (05/09/2025, 11:59:33 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in systems utilizing LUKS-encrypted disks with GRUB configured for TPM-based auto-decryption. When GRUB is set to automatically decrypt disks using keys stored in the TPM, it reads the decryption key into system memory. If an attacker with physical access can corrupt the underlying filesystem superblock, GRUB will fail to locate a valid filesystem and enter rescue mode. At this point, the disk is already decrypted, and the decryption key remains loaded in system memory. This scenario may allow an attacker with physical access to access the unencrypted data without any further authentication, thereby compromising data confidentiality. Furthermore, the ability to force this state through filesystem corruption also presents a data integrity concern.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:29:03 UTC

Technical Analysis

CVE-2025-4382 is a vulnerability identified in Red Hat Enterprise Linux 10 systems that utilize LUKS (Linux Unified Key Setup) disk encryption combined with GRUB bootloader configured for TPM (Trusted Platform Module)-based automatic disk decryption. Normally, TPM-based auto-decryption enhances security by securely storing disk decryption keys in the TPM hardware, which releases the key during boot without user interaction. However, this vulnerability arises because when GRUB auto-decrypts the disk, it reads the decryption key into system memory. If an attacker with physical access corrupts the underlying filesystem superblock, GRUB cannot locate a valid filesystem and enters rescue mode. At this point, the disk remains decrypted, and the decryption key is still present in system memory. This state effectively bypasses authentication, allowing the attacker to access unencrypted data directly. Additionally, the ability to force GRUB into rescue mode by corrupting the filesystem introduces a data integrity risk, as the attacker can manipulate disk contents. The vulnerability requires physical access and the capability to corrupt the filesystem, which limits remote exploitation but poses a significant risk in environments where physical security is weak. The CVSS v3.1 score is 5.9 (medium severity), reflecting the attack vector as physical, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality and integrity but no impact on availability. No known exploits have been reported in the wild as of the publication date. This vulnerability highlights a design weakness in the interaction between TPM-based auto-decryption and GRUB's handling of filesystem errors, necessitating careful mitigation.

Potential Impact

The primary impact of CVE-2025-4382 is the compromise of data confidentiality and integrity on affected systems. Attackers with physical access can bypass authentication controls by forcing GRUB into rescue mode through filesystem corruption, gaining access to decrypted disk contents and the decryption key in memory. This undermines the security guarantees provided by LUKS encryption and TPM-based key protection. Organizations relying on these technologies for protecting sensitive data on laptops, servers, or other devices are at risk of data breaches if physical security is insufficient. The vulnerability does not affect availability directly but can lead to data manipulation or unauthorized data disclosure. Environments with high physical security controls may have reduced risk, but scenarios such as lost or stolen devices, or insider threats, are particularly vulnerable. The medium CVSS score reflects the balance between the high impact on confidentiality/integrity and the requirement for physical access and filesystem corruption. This vulnerability could be exploited in targeted attacks against high-value assets, especially in sectors like government, finance, healthcare, and critical infrastructure where encrypted data protection is paramount.

Mitigation Recommendations

To mitigate CVE-2025-4382, organizations should implement multiple layers of defense beyond relying solely on TPM-based auto-decryption. Specific recommendations include: 1) Disable TPM-based automatic disk decryption on systems where physical security cannot be guaranteed, requiring manual passphrase entry at boot to prevent keys from being loaded into memory unattended. 2) Employ full disk encryption configurations that do not expose decryption keys in system memory during boot or use alternative bootloader configurations that handle filesystem errors securely. 3) Implement robust physical security controls to prevent unauthorized physical access to devices, including secure storage, tamper-evident seals, and access logging. 4) Regularly monitor and verify filesystem integrity to detect and remediate corruption attempts early. 5) Keep Red Hat Enterprise Linux and GRUB updated with the latest patches and security advisories once fixes for this vulnerability are released. 6) Consider using hardware security modules or enhanced TPM configurations that limit key exposure in memory. 7) Train IT staff and users on the risks of physical attacks and the importance of device security. 8) For high-risk environments, consider additional encryption layers or endpoint security solutions that detect unauthorized bootloader manipulations. These measures collectively reduce the risk of exploitation by addressing both the technical vulnerability and the physical attack vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-06T13:23:57.941Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd7b14

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 2/27/2026, 2:29:03 PM

Last updated: 3/28/2026, 10:42:37 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses