CVE-2025-10010
Configuration File Integrity Bypass in CryptoPro Secure Disk Enables Root Code Execution
Publication date: 2026-02-24
Last updated on: 2026-03-13
Assigner: SEC Consult Vulnerability Lab
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cpsd | cryptopro_secure_disk | to 7.6.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-353 | The product uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'The vulnerability affects the CPSD CryptoPro Secure Disk application, which uses a small Linux operating system on an unencrypted partition to authenticate users before decrypting the Windows partition with BitLocker.'}, {'type': 'paragraph', 'content': "Because the partition is unencrypted and accessible to anyone with physical access to the device, an attacker can modify configuration files that are not validated by the Linux kernel's Integrity Measurement Architecture (IMA)."}, {'type': 'paragraph', 'content': 'This allows the attacker to execute arbitrary code with root privileges during system startup, for example by placing a malicious script in the DHCP daemonβs enter-hook script, enabling persistent root access without triggering integrity errors.'}] [1]
How can this vulnerability impact me? :
An attacker with physical access to the device or hard drive can exploit this vulnerability to gain root-level control by modifying unprotected configuration files.
This can lead to the installation of backdoors, unauthorized persistent access, and the ability to execute arbitrary code during system startup.
Additionally, sensitive data such as network credentials and certificates stored in cleartext in the Linux environment can be accessed, potentially allowing unauthorized access to internal networks or bypassing network protections like 802.1x.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability involves modification of configuration files on an unencrypted Linux partition used by CPSD CryptoPro Secure Disk. Detection involves checking for unauthorized changes to configuration files, especially the DHCP daemonβs enter-hook script located at /etc/dhcpcd.enter-hook.'}, {'type': 'paragraph', 'content': "Since the Linux kernel's Integrity Measurement Architecture (IMA) does not validate these configuration files, manual inspection or file integrity monitoring tools should be used to detect changes."}, {'type': 'paragraph', 'content': 'Suggested commands to detect suspicious modifications include:'}, {'type': 'list_item', 'content': 'Check the modification time and contents of the enter-hook script: `ls -l /etc/dhcpcd.enter-hook` and `cat /etc/dhcpcd.enter-hook`'}, {'type': 'list_item', 'content': 'Verify other configuration files on the unencrypted partition for unexpected changes.'}, {'type': 'list_item', 'content': 'Check for unexpected files or scripts in the /tmp directory that might contain sensitive data or malicious code.'}, {'type': 'list_item', 'content': 'Use file integrity monitoring tools (e.g., tripwire, AIDE) configured to monitor the unencrypted partition files.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying the vendor-provided patches by upgrading CPSD CryptoPro Secure Disk to version 7.6.6, 7.7.1, or later.
If patching is not immediately possible, enable encryption of the Pre-Boot Authentication (PBA) partition manually, a feature available since version 7.6.0, to prevent unauthorized modification of the unencrypted partition.
Additionally, conduct a comprehensive security review to identify and remediate any further issues related to this vulnerability.
Restrict physical access to devices to prevent attackers from accessing or modifying the unencrypted partition.