CVE-2025-67792

7.8 HIGH

📋 TL;DR

A local privilege escalation vulnerability in DriveLock allows unprivileged Windows users to manipulate DriveLock processes and execute arbitrary commands with elevated privileges. This affects DriveLock versions 24.1 before 24.1.6, 24.2 before 24.2.7, and 25.1 before 25.1.5. Attackers with local access can gain system-level control of affected Windows computers.

💻 Affected Systems

Products:
  • DriveLock
Versions: 24.1 before 24.1.6, 24.2 before 24.2.7, 25.1 before 25.1.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows systems with DriveLock installed. Requires local user access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain SYSTEM privileges, install persistent malware, steal credentials, and pivot to other systems in the network.

🟠

Likely Case

Local attackers escalate privileges to install ransomware, keyloggers, or credential stealers on individual workstations, potentially leading to domain compromise.

🟢

If Mitigated

Limited to isolated workstation compromise if proper endpoint protection, application whitelisting, and least privilege principles are enforced.

🌐 Internet-Facing: LOW - This requires local access to the system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Any compromised user account or physical access to workstations can lead to full system control and lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local user access but no special privileges. The vulnerability description suggests manipulation of DriveLock processes is straightforward for local users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.1.6, 24.2.7, or 25.1.5

Vendor Advisory: https://drivelock.help/versions/current/web/en/releasenotes/Content/ReleaseNotes_DriveLock/SecurityBulletins/25-007-LocalPrivilegeEsc.htm

Restart Required: Yes

Instructions:

1. Identify affected DriveLock versions. 2. Download appropriate patch from vendor. 3. Apply patch to all affected systems. 4. Restart systems to complete installation.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Apply least privilege principles to limit what local users can execute and access.

Use Group Policy to restrict local user permissions
Implement application control policies

Monitor DriveLock processes

windows

Implement monitoring for unusual DriveLock process activity or manipulation attempts.

Configure Windows Event Log monitoring for process creation/modification
Set up alerts for DriveLock.exe anomalies

🧯 If You Can't Patch

  • Implement strict application whitelisting to prevent unauthorized command execution
  • Isolate affected systems from critical network segments and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check DriveLock version via Control Panel > Programs and Features or using 'wmic product get name,version' command and compare against affected versions.

Check Version:

wmic product where "name like '%DriveLock%'" get name,version

Verify Fix Applied:

Verify DriveLock version is 24.1.6, 24.2.7, or 25.1.5 or higher after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DriveLock process spawning child processes
  • DriveLock.exe executing unexpected commands
  • Failed privilege escalation attempts in security logs

Network Indicators:

  • Unexpected outbound connections from systems with DriveLock
  • Lateral movement attempts from DriveLock-protected systems

SIEM Query:

EventID=4688 AND (ProcessName='DriveLock.exe' OR ParentProcessName='DriveLock.exe') AND CommandLine CONTAINS ('cmd.exe', 'powershell.exe', 'wmic.exe')

🔗 References

📤 Share & Export