CVE-2025-14026
BaseFortify
Publication date: 2026-01-06
Last updated on: 2026-02-10
Assigner: CERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| forcepoint | one_data_loss_prevention | 23.04.5642 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Forcepoint One DLP Client version 23.04.5642 and possibly newer versions, where a restricted Python 2.5.4 runtime disables the ctypes library to prevent arbitrary code execution. However, attackers can bypass this restriction by transferring compiled ctypes dependencies from another system and patching the ctypes.pyd module, enabling the ctypes module to load successfully. This allows attackers to execute arbitrary code, invoke DLLs, manipulate memory, and run shellcode within the DLP client. [1]
How can this vulnerability impact me? :
The vulnerability allows arbitrary code execution within the Forcepoint One DLP Client, which can interfere with or bypass data loss prevention enforcement, alter client behavior, or disable security monitoring functions. This weakens enterprise endpoint security and could potentially allow attackers to compromise sensitive data or disrupt security controls. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves verifying the presence of the vulnerable Forcepoint One DLP Client version 23.04.5642 or similar versions that include the restricted Python 2.5.4 runtime. You can check installed software versions on endpoints to identify affected versions. Additionally, inspecting the Python runtime directory for the presence of the ctypes.pyd module or any patched versions may help. Specific commands depend on the operating system, but for example, on Windows, you can use 'wmic product get name, version' to list installed software and check for Forcepoint One DLP Client versions. Also, searching for the python.exe executable associated with Forcepoint One DLP Client and checking its version or presence can assist. There are no publicly documented specialized commands for detecting the bypass of the ctypes restriction beyond version checks and file inspections. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade Forcepoint One DLP Client to versions after 23.11 or Forcepoint DLP v10.2, where the vulnerable Python runtime (python.exe) has been removed. This update eliminates the vulnerable Python environment and prevents exploitation. Until the upgrade is applied, monitoring for unusual activity related to Python execution within the DLP client and restricting the ability to transfer and patch ctypes.pyd modules may reduce risk. Applying vendor-provided patches or following guidance in Forcepoint's knowledge base article KB 000042256 is also recommended. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows arbitrary code execution within the Forcepoint One DLP Client, which can interfere with or bypass data loss prevention enforcement and disable security monitoring functions. This weakening of endpoint security could potentially lead to unauthorized data access or leakage, thereby impacting an organization's ability to comply with data protection standards and regulations such as GDPR and HIPAA. However, the full impact scope in enterprise environments remains undetermined. [1]