CVE-2025-26125
Published: 17 March 2025
Description
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Security Summary
CVE-2025-26125 is a vulnerability in the IMFForceDelete driver of IObit Malware Fighter version 12.1.0, stemming from an exposed ioctl interface. This flaw, classified under CWE-782, enables attackers to perform arbitrary file deletions and escalate privileges. It has a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H), indicating high impact potential with low attack complexity for local users.
A local attacker with low privileges can exploit this vulnerability by interacting with the exposed ioctl, typically requiring some user interaction to trigger. Successful exploitation allows arbitrary file deletion across the system and privilege escalation, potentially granting higher-level access and enabling further compromise of the affected host.
Advisories and proof-of-concept details are available in researcher publications, including GitHub repositories at https://github.com/ZeroMemoryEx/CVE-2025-26125 and https://github.com/ZeroMemoryEx/IObit-EoP, as well as a related post at https://x.com/zeromemoryex/status/1876878269200449819. Security practitioners should consult these for exploitation demonstrations and monitor IObit for official patches or updates to mitigate the issue.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Vulnerability enables local privilege escalation via exposed IOCTL in kernel driver for arbitrary file deletion, directly mapping to T1068.