CVE-2025-67793
Unknown Unknown - Not Provided
Privilege Escalation in DriveLock API Allows Supervisor Role Assignment

Publication date: 2025-12-17

Last updated on: 2025-12-18

Assigner: MITRE

Description
An issue was discovered in DriveLock 24.1 through 24.1.*, 24.2 through 24.2.*, and 25.1 before 25.1.6. Users with the "Manage roles and permissions" privilege can promote themselves or other DOC users to the Supervisor role through an API call. This privilege is included by default in the Administrator role. This issue mainly affects cloud multi-tenant deployments; on-prem single-tenant installations are typically not impacted because local admins usually already have Supervisor privileges.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-17
Last Modified
2025-12-18
Generated
2026-05-06
AI Q&A
2025-12-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
drivelock drivelock_enterprise_service 25.1
drivelock drivelock_enterprise_service 24.2
drivelock drivelock_enterprise_service 24.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

This vulnerability in DriveLock Enterprise Service allows users who have the 'Manage roles and permissions' privilegeβ€”usually part of the Administrator roleβ€”to escalate their own or other DOC users' roles to Supervisor via an API call. This is an Incorrect Access Control / Role Escalation issue affecting mainly cloud multi-tenant deployments, enabling unauthorized privilege escalation through network-based API calls. [1]


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized privilege escalation, allowing users to gain Supervisor-level access. This can compromise system availability and confidentiality to a limited extent, especially in cloud multi-tenant environments. It may allow attackers or unauthorized users to perform actions reserved for Supervisors, potentially disrupting operations or accessing sensitive information. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring API calls that attempt to change user roles, specifically calls that promote DOC users to the Supervisor role. Enabling audit logging for role changes is recommended to track such activities. While specific commands are not provided, reviewing audit logs for role escalation events and monitoring network traffic for suspicious API calls related to role management can help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the DriveLock Enterprise Service update to version 25.1.6 Patch 4 or later, restricting DOC admin accounts to trusted personnel only, and enabling audit logging for role changes to monitor for unauthorized privilege escalations. Keeping DriveLock updated with the latest releases is also advised to maintain security. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart