CVE-2025-67794

6.1 MEDIUM

📋 TL;DR

DriveLock agent versions 24.1-24.2.7 and 25.1-25.1.5 create directories and files with overly permissive access control lists (ACLs). This allows local non-administrator users to trigger unauthorized actions or destabilize the agent, potentially disrupting endpoint security controls.

💻 Affected Systems

Products:
  • DriveLock
Versions: 24.1 through 24.1.*, 24.2 before 24.2.8, 25.1 before 25.1.6
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of vulnerable versions; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local users could modify or delete critical DriveLock files, disable security policies, or crash the agent, leaving endpoints unprotected from security threats.

🟠

Likely Case

Non-admin users could interfere with DriveLock operations, cause service instability, or access sensitive configuration files they shouldn't have permissions to view.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential service disruption without data compromise or privilege escalation.

🌐 Internet-Facing: LOW - This is a local privilege issue requiring local system access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Any local user without admin rights could potentially exploit this, but requires physical or remote desktop access to vulnerable systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but no special privileges or complex techniques - just standard file system operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.2.8 or 25.1.6

Vendor Advisory: https://drivelock.help/sb/Content/SecurityBulletins/25-009-AgIncPermissions.htm

Restart Required: Yes

Instructions:

1. Download and install DriveLock version 24.2.8 (for 24.2 branch) or 25.1.6 (for 25.1 branch). 2. For 24.1 versions, upgrade to 24.2.8 or 25.1.6. 3. Restart affected systems to ensure new ACLs are applied.

🔧 Temporary Workarounds

Manual ACL Hardening

windows

Manually adjust permissions on DriveLock directories to restrict non-admin access

icacls "C:\Program Files\DriveLock" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F"
icacls "C:\ProgramData\DriveLock" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F"

🧯 If You Can't Patch

  • Implement strict access controls on DriveLock directories using group policy or manual ACL adjustments
  • Monitor DriveLock directories for unauthorized access attempts using file integrity monitoring

🔍 How to Verify

Check if Vulnerable:

Check DriveLock version via Control Panel > Programs and Features, or check registry: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Centennial\DriveLock\Version

Check Version:

reg query "HKLM\SOFTWARE\WOW6432Node\Centennial\DriveLock" /v Version

Verify Fix Applied:

Verify version is 24.2.8 or higher (24.2 branch) or 25.1.6 or higher (25.1 branch), and check ACLs on DriveLock directories show restricted non-admin access

📡 Detection & Monitoring

Log Indicators:

  • Windows Security event logs showing unauthorized access attempts to DriveLock directories (Event ID 4663)
  • DriveLock agent logs showing unexpected service restarts or failures

Network Indicators:

  • None - this is a local file system vulnerability

SIEM Query:

EventID=4663 AND ObjectName:"*DriveLock*" AND AccessMask!=0x100000 AND SubjectUserName!="SYSTEM" AND SubjectUserName!="Administrator"

🔗 References

📤 Share & Export