CVE-2025-67793

9.8 CRITICAL

📋 TL;DR

A privilege escalation vulnerability in DriveLock allows users with 'Manage roles and permissions' privilege to promote themselves or other users to Supervisor role via API. This affects cloud multi-tenant deployments of DriveLock 24.1-24.2 and 25.1 before 25.1.6. On-prem single-tenant installations are typically not impacted as local admins usually already have Supervisor privileges.

💻 Affected Systems

Products:
  • DriveLock
Versions: 24.1 through 24.2.*, 25.1 before 25.1.6
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Primarily impacts cloud multi-tenant deployments. On-prem single-tenant installations typically not affected as local admins usually already have Supervisor privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain Supervisor privileges, enabling full administrative control over the DriveLock environment, potentially compromising all managed endpoints and data.

🟠

Likely Case

Malicious or compromised users with administrative access escalate privileges to Supervisor role, gaining unauthorized control over security policies and user permissions.

🟢

If Mitigated

Limited impact if proper role-based access controls and monitoring are implemented to detect privilege escalation attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with 'Manage roles and permissions' privilege, which is included by default in Administrator role.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.1.6

Vendor Advisory: https://drivelock.help/sb/Content/SecurityBulletins/25-008-DESPrivilegeEsc.htm

Restart Required: Yes

Instructions:

1. Upgrade DriveLock to version 25.1.6 or later. 2. Restart DriveLock services. 3. Verify the update was successful.

🔧 Temporary Workarounds

Remove 'Manage roles and permissions' from Administrator role

windows

Temporarily remove the vulnerable privilege from Administrator role until patching can be completed.

Navigate to DriveLock Admin Console > Roles > Administrator > Permissions > Remove 'Manage roles and permissions'

Implement API access restrictions

all

Restrict API access to trusted IP addresses and implement rate limiting.

Configure firewall rules to restrict DriveLock API access to authorized management networks only

🧯 If You Can't Patch

  • Implement strict least privilege access controls and regularly audit user permissions
  • Enable detailed logging of all role and permission changes and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check DriveLock version in Admin Console. If version is between 24.1-24.2.* or 25.1 before 25.1.6, system is vulnerable.

Check Version:

Check DriveLock Admin Console > About or use DriveLock CLI: drivelock --version

Verify Fix Applied:

Verify DriveLock version is 25.1.6 or later in Admin Console and test that users with 'Manage roles and permissions' cannot escalate to Supervisor role.

📡 Detection & Monitoring

Log Indicators:

  • API calls to modify user roles, particularly elevation to Supervisor role
  • Multiple failed permission change attempts followed by successful escalation

Network Indicators:

  • Unusual API call patterns to role management endpoints from non-admin workstations

SIEM Query:

source="drivelock" AND (event_type="role_change" OR event_type="permission_modification") AND target_role="Supervisor"

🔗 References

📤 Share & Export