Cyber Posture

CVE-2025-26125

High

Published: 17 March 2025

Published
17 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-26125 is a vulnerability in the IMFForceDelete driver of IObit Malware Fighter version 12.1.0, stemming from an exposed ioctl interface. This flaw, classified under CWE-782, enables attackers to perform arbitrary file deletions and escalate privileges. It has a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H), indicating high impact potential with low attack complexity for local users.

A local attacker with low privileges can exploit this vulnerability by interacting with the exposed ioctl, typically requiring some user interaction to trigger. Successful exploitation allows arbitrary file deletion across the system and privilege escalation, potentially granting higher-level access and enabling further compromise of the affected host.

Advisories and proof-of-concept details are available in researcher publications, including GitHub repositories at https://github.com/ZeroMemoryEx/CVE-2025-26125 and https://github.com/ZeroMemoryEx/IObit-EoP, as well as a related post at https://x.com/zeromemoryex/status/1876878269200449819. Security practitioners should consult these for exploitation demonstrations and monitor IObit for official patches or updates to mitigate the issue.

Details

CWE(s)
CWE-782

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Vulnerability enables local privilege escalation via exposed IOCTL in kernel driver for arbitrary file deletion, directly mapping to T1068.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References