Cyber Posture

CVE-2025-0288

High

Published: 03 March 2025

Published
03 March 2025
Modified
25 June 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-0288 is an arbitrary kernel memory write vulnerability in the biontdrv.sys driver, affecting various Paragon Software products, particularly those in the Hard Disk Manager product line. The flaw arises from the memmove function failing to validate or sanitize user-controlled input, enabling attackers to overwrite kernel memory. Published on March 3, 2025, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high impact on confidentiality, integrity, and availability.

A local attacker with low privileges can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows arbitrary kernel memory writes, facilitating privilege escalation to kernel-level access and potential full system compromise.

Paragon Software has released a security patch specifically addressing the biontdrv.sys driver in all Hard Disk Manager product line products, as detailed in their support article. The CERT/CC vulnerability note (VU#726882) provides additional guidance, and users should check Paragon's support page for available patches to mitigate the issue.

Details

CWE(s)
NVD-CWE-noinfo

Affected Products

paragon-software
paragon backup \& recovery
15 — 17.39
paragon-software
paragon disk wiper
15 — 16
paragon-software
paragon drive copy
15 — 16
paragon-software
paragon hard disk manager
15 — 17.39
paragon-software
paragon migrate os to ssd
4 — 5
paragon-software
paragon partition manager
15 — 17.39

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Arbitrary kernel memory write in a driver directly enables local privilege escalation to kernel-level access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References