CVE-2025-67792
Unknown Unknown - Not Provided
Command Injection in DriveLock Allows Local Arbitrary Code Execution

Publication date: 2025-12-17

Last updated on: 2025-12-18

Assigner: MITRE

Description
An issue was discovered in DriveLock 24.1 before 24.1.6, 24.2 before 24.2.7, and 25.1 before 25.1.5. Local unprivileged users can manipulate a DriveLock process to execute arbitrary commands on Windows computers.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-17
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-17
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
drivelock drivelock From 24.1 (inc) to 24.1.6 (exc)
drivelock drivelock From 24.2 (inc) to 24.2.7 (exc)
drivelock drivelock From 25.1 (inc) to 25.1.5 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-67792 is a local privilege escalation vulnerability in DriveLock Agent on Windows systems. It allows local unprivileged users to manipulate a DriveLock process to execute arbitrary commands, thereby gaining elevated privileges due to incorrect access control in certain DriveLock versions prior to the fixed releases. [1]


How can this vulnerability impact me? :

This vulnerability can allow an attacker with local access and low privileges to execute arbitrary commands with elevated privileges on a Windows system running vulnerable DriveLock versions. This can lead to full compromise of confidentiality, integrity, and availability of the affected system. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to update DriveLock to the patched versions: 24.1.6, 24.2.7, or 25.1.5. It is strongly recommended to upgrade directly to version 25.1 Patch 3 (25.1.5) for optimal security and support. Older versions remain vulnerable and are no longer supported. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not contain information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart