fkie_cve-2025-27460
Vulnerability from fkie_nvd
Published
2025-07-03 12:15
Modified
2025-07-03 15:13
Severity ?
Summary
The hard drives of the device are not encrypted using a full volume encryption feature such as BitLocker. This allows an attacker with physical access to the device to use an alternative operating system to interact with the hard drives, completely circumventing the Windows login. The attacker can read from and write to all files on the hard drives.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "The hard drives of the device are not encrypted using a full volume encryption feature such as BitLocker. This allows an attacker with physical access to the device to use an alternative operating system to interact with the hard drives, completely circumventing the Windows login. The attacker can read from and write to all files on the hard drives." }, { "lang": "es", "value": "Los discos duros del dispositivo no est\u00e1n cifrados con una funci\u00f3n de cifrado de volumen completo como BitLocker. Esto permite a un atacante con acceso f\u00edsico al dispositivo usar un sistema operativo alternativo para interactuar con los discos duros, evadiendo por completo el inicio de sesi\u00f3n de Windows. El atacante puede leer y escribir en todos los archivos de los discos duros." } ], "id": "CVE-2025-27460", "lastModified": "2025-07-03T15:13:53.147", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 6.0, "source": "psirt@sick.de", "type": "Secondary" } ] }, "published": "2025-07-03T12:15:24.203", "references": [ { "source": "psirt@sick.de", "url": "https://sick.com/psirt" }, { "source": "psirt@sick.de", "url": "https://sick.com/psirt" }, { "source": "psirt@sick.de", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "source": "psirt@sick.de", "url": "https://www.endress.com" }, { "source": "psirt@sick.de", "url": "https://www.first.org/cvss/calculator/3.1" }, { "source": "psirt@sick.de", "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json" }, { "source": "psirt@sick.de", "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf" } ], "sourceIdentifier": "psirt@sick.de", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "psirt@sick.de", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…