CVE-2025-0287

5.1 MEDIUM

📋 TL;DR

This vulnerability in Paragon Software's biontdrv.sys driver allows attackers to execute arbitrary code in the kernel through a null pointer dereference, potentially leading to privilege escalation. It affects users of Paragon's Hard Disk Manager product line and related software. Attackers need local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Paragon Hard Disk Manager
  • Paragon Backup & Recovery
  • Paragon Partition Manager
  • Other Paragon disk management products
Versions: All versions prior to security patches released in 2025
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the vulnerable biontdrv.sys driver to be installed and loaded, which occurs with Paragon disk management software installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with kernel-level code execution, allowing attackers to gain SYSTEM privileges, install persistent malware, or disable security controls.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM/administrator privileges, enabling further lateral movement or persistence establishment.

🟢

If Mitigated

Limited impact if proper endpoint protection and least privilege principles are enforced, though kernel-level vulnerabilities remain serious.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to interact with the vulnerable driver. Kernel exploitation adds complexity but driver vulnerabilities are often targeted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates released in 2025

Vendor Advisory: https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys

Restart Required: Yes

Instructions:

1. Visit Paragon Software support page. 2. Download latest security update for your product. 3. Install the update. 4. Restart the system.

🔧 Temporary Workarounds

Disable or remove vulnerable driver

windows

Uninstall Paragon software or disable the biontdrv.sys driver if not needed

sc stop biontdrv
sc delete biontdrv

Restrict driver access

windows

Use application control policies to block execution of vulnerable driver

🧯 If You Can't Patch

  • Implement strict application control policies to prevent unauthorized driver loading
  • Enforce least privilege principles and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if biontdrv.sys driver is present in system32\drivers and verify version is pre-2025

Check Version:

powershell Get-Item "C:\Windows\System32\drivers\biontdrv.sys" | Select-Object VersionInfo

Verify Fix Applied:

Verify biontdrv.sys driver version has been updated to 2025 or later, or confirm driver is no longer present

📡 Detection & Monitoring

Log Indicators:

  • Driver load events for biontdrv.sys
  • Privilege escalation attempts
  • Unexpected kernel-mode process creation

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=7045 AND ServiceName="biontdrv" OR ProcessName="biontdrv.sys"

🔗 References

📤 Share & Export