tl; dr<p>"1.3 Findings Summary<p>During this engagement, the iSEC team identified eleven (11) issues in the assessed areas. Most
issues were of severity Medium (four (4) found) or Low (four (4) found), with an additional
three (3) issues having severity Informational (pertaining to Defense in Depth).<p>Overall, the source code for both the bootloader and the Windows kernel driver did not meet
expected standards for secure code. This includes issues such as lack of comments, use of insecure or deprecated functions, inconsistent variable types, and so forth. A more in-depth discussion on the quality issues identified can be found in Appendix B....<p>The team also found a potential weakness in the Volume Header integrity checks. Currently,
integrity is provided using a string (“TRUE”) and two (2) CRC32s. The current version of TrueCrypt utilizes XTS
2 as the block cipher mode of operation, which lacks protection against modification; however, it is insufficiently malleable to be reliably attacked. The integrity protection can be bypassed, but XTS prevents a reliable attack, so it does not currently appear to be an issue. Nonetheless, it is not clear why a cryptographic hash or HMAC was not used instead.<p>Finally, iSEC found no evidence of backdoors or otherwise intentionally malicious code in the
assessed areas. The vulnerabilities described later in this document all appear to be uninte ntional, introduced as the result of bugs rather than malice."