Critical flaws found in open-source encryption software VeraCrypt

Many issues were found in the new UEFI bootloader that have been patched in VeraCrypt 1.19

VeraCrypt 1.19 fixes critical flaws in UEFI bootloader.
Credit: IDGNS

A new security audit has found critical vulnerabilities in VeraCrypt, an open-source, full-disk encryption program that's the direct successor of the widely popular, but now defunct, TrueCrypt.

Users are encouraged to upgrade to VeraCrypt 1.19, which was released Monday and includes patches for most of the flaws. Some issues remain unpatched because fixing them requires complex changes to the code and in some cases would break backward compatibility with TrueCrypt.

However, the impact of most of those issues can be avoided by following the safe practices mentioned in the VeraCrypt user documentation when setting up encrypted containers and using the software.

The audit, performed by French cybersecurity firm QuarksLab and was sponsored through the Open Source Technology Improvement Fund (OSTIF), found eight critical vulnerabilities, three medium risk vulnerabilities and 15 low-impact flaws. Some of them are unpatched issues previously found by an older TrueCrypt audit.

Many flaws were located and fixed in VeraCrypt's bootloader for computers and OSes that use the new UEFI (Unified Extensible Firmware Interface) -- the modern BIOS. TrueCrypt, which serves as the base for VeraCrypt, never supported UEFI, forcing users to disable UEFI boot if they wanted to encrypt the system partition.

VeraCrypt's UEFI-compatible bootloader -- a first for open-source encryption programs on Windows -- was released in August and is the biggest addition to the TrueCrypt code base made by VeraCrypt's lead developer, Mounir Idrassi. This makes it much less mature than the rest of the code, so it's understandable it would have more flaws.

Another change made following the audit was the removal of the Russian GOST 28147-89 encryption standard, whose implementation the auditors deemed unsafe. Users will still be able to decrypt and access existing containers encrypted with this algorithm, but won't be able to create new ones.

The XZip and XUnzip libraries that were used in VeraCrypt for various operations also had flaws, so the developer decided to replace them with the more modern and secure libzip library.

The auditors thanked Mounir Idrassi and his company Idrix for working with them on resolving the identified problems and for developing what they called a "crucial open-source software" program.

While VeraCrypt is available for multiple operating systems, it has had the biggest impact on Windows, because there aren't many free, full-disk encryption options on Windows that also allow encrypting the OS drive.

Microsoft's BitLocker disk encryption technology is included only in the professional and enterprise versions of Windows, and most other solutions are commercial. This is what made TrueCrypt so popular in the first place and why its sudden demise left a big void.

Idrassi clarified on Twitter Tuesday that all issues specific to VeraCrypt and one inherited from TrueCrypt were fixed in VeraCrypt 1.19. The remaining issues that haven't yet been fixed are all inherited from TrueCrypt.

To express your thoughts on Computerworld content, visit Computerworld's Facebook page, LinkedIn page and Twitter stream.
Windows 10 annoyances and solutions
Shop Tech Products at Amazon
Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.