CVE-2025-67789
BaseFortify
Publication date: 2025-12-17
Last updated on: 2025-12-18
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| drivelock | drivelock | From 24.1 (inc) to 24.1.6 (exc) |
| drivelock | drivelock | From 24.2 (inc) to 24.2.7 (exc) |
| drivelock | drivelock | From 25.1 (inc) to 25.1.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an information disclosure issue in DriveLock Enterprise Service (DES) versions before 25.1.5. Authenticated users can exploit insufficient permission checks in the DES API to remotely retrieve the number of computers associated with other DriveLock tenants. This primarily affects cloud customers and is caused by insecure permissions in the API. [1]
How can this vulnerability impact me? :
The vulnerability allows authenticated users to obtain information about other tenants' computer counts, which could lead to unauthorized disclosure of sensitive organizational data. Although it does not affect data integrity or availability, this information disclosure could be leveraged for further attacks or reconnaissance. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update DriveLock to version 25.1.5 or later, as this version contains the fix for the information disclosure issue caused by insufficient permission checks in the DriveLock Enterprise Service API. [1]