CryptoPro Secure Disk for BitLocker Vulnerabilities Enable Root Access and Credential Theft


Attackers with physical access can exploit flaws in CryptoPro Secure Disk (CPSD) for BitLocker to gain root privileges and steal credentials. These issues affect the software’s Linux pre-boot environment. Researchers at SEC Consult Vulnerability Lab found two key vulnerabilities. CPSD confirms patches fix them in versions 7.6.6 and 7.7.1. Their advisory states: “Update to mitigate integrity bypass (CVE-2025-10010) and cleartext storage risks.”

CPSD protects Windows partitions with BitLocker encryption. It runs a minimal Linux system on an unencrypted partition for user authentication. Physical access lets anyone boot this system. The first flaw bypasses file integrity checks. This allows root code execution.

SEC Consult reported the issues in June 2025. CPSD released fixes promptly. No active exploits appear in public feeds as of February 26, 2026. Check CPSD updates and CVE details for latest status.

The integrity bypass targets Linux Integrity Measurement Architecture (IMA). IMA verifies files but skips config files. Attackers alter them to run shells or backdoors. A simple tweak executes code like a reverse shell without alerts.

Vulnerability Details

CVECVSSImpactFixed In
CVE-2025-10010N/A (High)Root code execution via integrity bypass7.6.6 / 7.7.1
N/AN/A (Medium)Cleartext creds in /tmp expose networks7.6.6 / 7.7.1

The second flaw hits the “forgot password” feature. It stores certs and WLAN passwords in plain text under /tmp. Root access from the first vuln lets attackers grab them. This bypasses 802.1X controls and grants network entry.

Organizations in high-security sectors use CPSD for endpoint protection. Physical theft risks rise with remote work. One compromised device exposes encrypted data and internals.

Cleartext certificate credentials expose WLAN access and enable 802.1X bypass(source : sec-consult)

Affected Versions and Patches

  • Vulnerable: Below 7.6.6 or 7.7.1
  • Fixed: 7.6.6 (encrypts PBA partition); 7.7.1 (default encryption)
  • Workaround: Enable PBA encryption if on 7.6.0+

CPSD notes: “Encrypt the pre-boot partition to block modifications.”

Protection Steps

Act fast to secure systems.

  • Update to 7.6.6 or later immediately.
  • Encrypt PBA partitions manually if needed.
  • Limit physical access; use TPM 2.0 full-disk encryption.
  • Audit encryption tools yearly.
  • Monitor boot logs for tampering.

FAQ

What do CPSD BitLocker vulnerabilities allow?

Root access via integrity bypass and credential theft from /tmp.

Which versions are safe?

7.6.6 and 7.7.1 or higher. 

How does the attack start?

Physical access to boot the unencrypted Linux partition.

Are exploits public?

No confirmed wild exploits as of February 2026.

What if I can’t update?

Encrypt PBA partition (available since 7.6.0).

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages