CVE-2025-67791

9.8 CRITICAL

📋 TL;DR

An authentication misconfiguration in DriveLock Enterprise Service (DES) allows attackers to impersonate any DriveLock agent on the network. This affects DriveLock tenants running versions 24.1 through 24.1.*, 24.2 through 24.2.*, and 25.1 through 25.1.*. Attackers can bypass authentication mechanisms and potentially gain unauthorized access to enterprise systems.

💻 Affected Systems

Products:
  • DriveLock Enterprise Service (DES)
Versions: 24.1 through 24.1.*, 24.2 through 24.2.*, 25.1 through 25.1.*
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects DriveLock tenants with the specific misconfiguration in agent authentication settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of DriveLock-managed endpoints, data exfiltration, ransomware deployment across the enterprise, and lateral movement to critical systems.

🟠

Likely Case

Unauthorized access to sensitive data on protected endpoints, installation of malware or backdoors, and privilege escalation within the DriveLock environment.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring that detects anomalous agent behavior.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: HIGH with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the DriveLock Enterprise Service and knowledge of agent impersonation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.1.1 or later

Vendor Advisory: https://drivelock.help/versions/current/web/en/releasenotes/Content/ReleaseNotes_DriveLock/SecurityBulletins/25-006-DESMisconfig.htm

Restart Required: Yes

Instructions:

1. Update DriveLock Enterprise Service to version 25.1.1 or later. 2. Apply the updated configuration to all tenants. 3. Restart the DES service. 4. Verify agent authentication is properly configured.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DriveLock Enterprise Service from untrusted networks and restrict access to authorized IP addresses only.

Configure firewall rules to allow only trusted subnets to access DES ports (typically TCP 443 and 8443)

Enhanced Monitoring

all

Implement strict monitoring of DES authentication logs and alert on any unauthorized agent connection attempts.

Enable detailed logging in DriveLock admin console and configure SIEM alerts for failed or suspicious agent authentications

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate DriveLock Enterprise Service from all untrusted networks.
  • Enable detailed logging and monitoring for all DES authentication events and investigate any anomalies immediately.

🔍 How to Verify

Check if Vulnerable:

Check DriveLock admin console for version numbers and review DES configuration for proper agent authentication settings.

Check Version:

In DriveLock admin console, navigate to System > About to check DES version.

Verify Fix Applied:

Verify DES version is 25.1.1 or later and test agent authentication with proper credentials and unauthorized attempts.

📡 Detection & Monitoring

Log Indicators:

  • Failed agent authentication attempts from unexpected IP addresses
  • Multiple agent connections from single IP
  • Agent connections without proper certificate validation

Network Indicators:

  • Unusual traffic patterns to DES ports (443/8443) from unauthorized subnets
  • Agent communication without TLS encryption

SIEM Query:

source="drivelock" AND (event_type="authentication_failure" OR agent_ip NOT IN allowed_subnets)

🔗 References

📤 Share & Export