CVE-2025-67794
Overly Permissive ACLs in DriveLock Agent Allow Local Exploitation
Publication date: 2025-12-17
Last updated on: 2025-12-18
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| drivelock | drivelock | From 24.1 (inc) to 24.1.4 (inc) |
| drivelock | drivelock | From 24.2 (inc) to 24.2.8 (exc) |
| drivelock | drivelock | From 25.1 (inc) to 25.1.6 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in DriveLock versions 24.1 through 24.1.*, 24.2 before 24.2.8, and 25.1 before 25.1.6. It involves directories and files created by the DriveLock agent having overly permissive Access Control Lists (ACLs). This means that local users who do not have administrator rights can exploit these permissions to trigger actions or destabilize the agent.
How can this vulnerability impact me? :
The vulnerability can allow local users without administrator privileges to perform unauthorized actions or destabilize the DriveLock agent. This could lead to potential security risks such as unauthorized modifications, disruptions in the agent's operation, or other unintended behaviors affecting system stability or security.