CVE-2025-0285
📋 TL;DR
This vulnerability in Paragon Software's Hard Disk Manager product line allows attackers to map arbitrary kernel memory through the biontdrv.sys driver. By exploiting improper validation of user-supplied data length, local attackers can escalate privileges from user to kernel mode. All users of affected Paragon Hard Disk Manager products are at risk.
💻 Affected Systems
- Paragon Hard Disk Manager
- Paragon Backup & Recovery
- Paragon Partition Manager
- Other Paragon disk management products
📦 What is this software?
Paragon Backup \& Recovery by Paragon Software
Paragon Disk Wiper by Paragon Software
Paragon Drive Copy by Paragon Software
Paragon Hard Disk Manager by Paragon Software
Paragon Migrate Os To Ssd by Paragon Software
Paragon Partition Manager by Paragon Software
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with kernel-level access, enabling persistent malware installation, data theft, and disabling of security controls.
Likely Case
Local privilege escalation allowing attackers to gain SYSTEM/administrator privileges on compromised machines.
If Mitigated
Limited impact if proper patch management and least privilege principles are enforced, though kernel vulnerabilities remain serious.
🎯 Exploit Status
Requires local access and ability to execute code. Kernel driver vulnerabilities are attractive targets for sophisticated attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Security updates released February 2025
Restart Required: Yes
Instructions:
1. Visit Paragon Software support page. 2. Download latest security update for your product. 3. Install update. 4. Restart system. 5. Verify biontdrv.sys driver version is updated.
🔧 Temporary Workarounds
Disable vulnerable driver
windowsPrevent biontdrv.sys from loading by disabling the driver service
sc stop biontdrv
sc config biontdrv start= disabled
Remove driver file
windowsDelete or rename the vulnerable driver file
takeown /f C:\Windows\System32\drivers\biontdrv.sys
icacls C:\Windows\System32\drivers\biontdrv.sys /grant administrators:F
del C:\Windows\System32\drivers\biontdrv.sys
🧯 If You Can't Patch
- Restrict local user privileges to prevent initial access
- Implement application control to block execution of unauthorized programs
🔍 How to Verify
Check if Vulnerable:
Check if biontdrv.sys driver exists in C:\Windows\System32\drivers\ and verify version is older than February 2025 patches
Check Version:
powershell "Get-Item C:\Windows\System32\drivers\biontdrv.sys | Select-Object VersionInfo"
Verify Fix Applied:
Verify biontdrv.sys file version shows 2025 date or check Paragon product version is updated
📡 Detection & Monitoring
Log Indicators:
- Driver load events for biontdrv.sys
- Process creation with high privileges following user-level processes
- Unexpected kernel driver installations
Network Indicators:
- None - local exploit only
SIEM Query:
EventID=6 OR EventID=7 (Driver load) AND DriverName contains 'biontdrv'