CVE-2025-67792
Command Injection in DriveLock Allows Local Arbitrary Code Execution
Publication date: 2025-12-17
Last updated on: 2025-12-18
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| drivelock | drivelock | From 24.1 (inc) to 24.1.6 (exc) |
| drivelock | drivelock | From 24.2 (inc) to 24.2.7 (exc) |
| drivelock | drivelock | From 25.1 (inc) to 25.1.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-67792 is a local privilege escalation vulnerability in DriveLock Agent on Windows systems. It allows local unprivileged users to manipulate a DriveLock process to execute arbitrary commands, thereby gaining elevated privileges due to incorrect access control in certain DriveLock versions prior to the fixed releases. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker with local access and low privileges to execute arbitrary commands with elevated privileges on a Windows system running vulnerable DriveLock versions. This can lead to full compromise of confidentiality, integrity, and availability of the affected system. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update DriveLock to the patched versions: 24.1.6, 24.2.7, or 25.1.5. It is strongly recommended to upgrade directly to version 25.1 Patch 3 (25.1.5) for optimal security and support. Older versions remain vulnerable and are no longer supported. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources do not contain information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.