CVE-2025-67790: n/a
An issue was discovered in DriveLock 24.1 before 24.1.6, 24.2 before 24.2.7, and 25.1 before 25.1.5. An unprivileged user could cause occasionally a Blue Screen Of Death (BSOD) on Windows computers by using an IOCTL and an unterminated string.
AI Analysis
Technical Summary
CVE-2025-67790 is a critical security vulnerability identified in multiple versions of DriveLock, a security software product widely used for endpoint protection and device control on Windows platforms. The vulnerability arises from improper handling of IOCTL (Input Output Control) requests involving unterminated strings. Specifically, an unprivileged user can send a specially crafted IOCTL request containing an unterminated string to the DriveLock driver, which leads to improper memory handling and triggers a Blue Screen of Death (BSOD) on affected Windows systems. This results in a denial-of-service condition by crashing the operating system kernel. The vulnerability is classified under CWE-170 (Improper Null Termination), indicating a failure to properly terminate strings, which can cause buffer overflows or memory corruption. The CVSS v3.1 base score of 9.8 (critical) reflects the vulnerability’s high exploitability (network attack vector, no privileges required, no user interaction) and severe impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation and potential for widespread disruption make this a significant threat. The affected DriveLock versions include 24.1 before 24.1.6, 24.2 before 24.2.7, and 25.1 before 25.1.5. The vulnerability can be exploited remotely by any unprivileged user with access to the vulnerable system, potentially allowing attackers to disrupt business operations by forcing system reboots and causing data loss or corruption. The lack of authentication requirements and the ability to cause system crashes without user interaction increase the risk profile substantially.
Potential Impact
For European organizations, the impact of CVE-2025-67790 is primarily a denial-of-service condition that can cause critical Windows systems to crash unexpectedly. This can disrupt business continuity, especially in environments relying heavily on endpoint security solutions like DriveLock for device control and data protection. The resulting BSODs can lead to loss of unsaved data, interruption of critical services, and increased operational costs due to system downtime and recovery efforts. Organizations in sectors such as finance, healthcare, manufacturing, and government, where DriveLock is commonly deployed, may face significant operational risks. Additionally, repeated crashes could be leveraged as part of a larger attack chain to distract or disable security monitoring and response capabilities. The vulnerability’s ease of exploitation without requiring privileges or user interaction means that insider threats or attackers who gain limited access could cause widespread disruption. This is particularly concerning for European enterprises with strict regulatory requirements around data availability and integrity, such as GDPR and NIS Directive compliance.
Mitigation Recommendations
1. Immediate application of patches: Organizations should monitor DriveLock vendor announcements and apply updates to versions 24.1.6, 24.2.7, or 25.1.5 as soon as they become available to remediate the vulnerability. 2. Restrict access to vulnerable interfaces: Limit access to the DriveLock driver’s IOCTL interface to trusted and authorized users only, using Windows security policies and access control lists (ACLs). 3. Network segmentation: Isolate critical systems running DriveLock from untrusted networks and users to reduce exposure to remote exploitation. 4. Implement endpoint monitoring: Deploy advanced endpoint detection and response (EDR) tools to detect anomalous IOCTL requests or unusual system crashes that may indicate exploitation attempts. 5. Conduct regular system integrity checks and backups: Ensure that critical data and system states are backed up frequently to enable rapid recovery from crashes or data corruption. 6. User privilege management: Enforce the principle of least privilege to minimize the number of users with access to vulnerable systems and interfaces. 7. Incident response readiness: Prepare and test incident response plans specifically for denial-of-service scenarios caused by system crashes to minimize downtime.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium
CVE-2025-67790: n/a
Description
An issue was discovered in DriveLock 24.1 before 24.1.6, 24.2 before 24.2.7, and 25.1 before 25.1.5. An unprivileged user could cause occasionally a Blue Screen Of Death (BSOD) on Windows computers by using an IOCTL and an unterminated string.
AI-Powered Analysis
Technical Analysis
CVE-2025-67790 is a critical security vulnerability identified in multiple versions of DriveLock, a security software product widely used for endpoint protection and device control on Windows platforms. The vulnerability arises from improper handling of IOCTL (Input Output Control) requests involving unterminated strings. Specifically, an unprivileged user can send a specially crafted IOCTL request containing an unterminated string to the DriveLock driver, which leads to improper memory handling and triggers a Blue Screen of Death (BSOD) on affected Windows systems. This results in a denial-of-service condition by crashing the operating system kernel. The vulnerability is classified under CWE-170 (Improper Null Termination), indicating a failure to properly terminate strings, which can cause buffer overflows or memory corruption. The CVSS v3.1 base score of 9.8 (critical) reflects the vulnerability’s high exploitability (network attack vector, no privileges required, no user interaction) and severe impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the ease of exploitation and potential for widespread disruption make this a significant threat. The affected DriveLock versions include 24.1 before 24.1.6, 24.2 before 24.2.7, and 25.1 before 25.1.5. The vulnerability can be exploited remotely by any unprivileged user with access to the vulnerable system, potentially allowing attackers to disrupt business operations by forcing system reboots and causing data loss or corruption. The lack of authentication requirements and the ability to cause system crashes without user interaction increase the risk profile substantially.
Potential Impact
For European organizations, the impact of CVE-2025-67790 is primarily a denial-of-service condition that can cause critical Windows systems to crash unexpectedly. This can disrupt business continuity, especially in environments relying heavily on endpoint security solutions like DriveLock for device control and data protection. The resulting BSODs can lead to loss of unsaved data, interruption of critical services, and increased operational costs due to system downtime and recovery efforts. Organizations in sectors such as finance, healthcare, manufacturing, and government, where DriveLock is commonly deployed, may face significant operational risks. Additionally, repeated crashes could be leveraged as part of a larger attack chain to distract or disable security monitoring and response capabilities. The vulnerability’s ease of exploitation without requiring privileges or user interaction means that insider threats or attackers who gain limited access could cause widespread disruption. This is particularly concerning for European enterprises with strict regulatory requirements around data availability and integrity, such as GDPR and NIS Directive compliance.
Mitigation Recommendations
1. Immediate application of patches: Organizations should monitor DriveLock vendor announcements and apply updates to versions 24.1.6, 24.2.7, or 25.1.5 as soon as they become available to remediate the vulnerability. 2. Restrict access to vulnerable interfaces: Limit access to the DriveLock driver’s IOCTL interface to trusted and authorized users only, using Windows security policies and access control lists (ACLs). 3. Network segmentation: Isolate critical systems running DriveLock from untrusted networks and users to reduce exposure to remote exploitation. 4. Implement endpoint monitoring: Deploy advanced endpoint detection and response (EDR) tools to detect anomalous IOCTL requests or unusual system crashes that may indicate exploitation attempts. 5. Conduct regular system integrity checks and backups: Ensure that critical data and system states are backed up frequently to enable rapid recovery from crashes or data corruption. 6. User privilege management: Enforce the principle of least privilege to minimize the number of users with access to vulnerable systems and interfaces. 7. Incident response readiness: Prepare and test incident response plans specifically for denial-of-service scenarios caused by system crashes to minimize downtime.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-12T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69431b97fab815a9fc199cc3
Added to database: 12/17/2025, 9:07:35 PM
Last enriched: 12/24/2025, 9:35:55 PM
Last updated: 2/4/2026, 12:54:30 PM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
DockerDash Flaw in Docker AI Assistant Leads to RCE, Data Theft
CriticalCVE-2025-59818: Vulnerability in Zenitel TCIS-3+
CriticalCVE-2025-41085: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Apidog Apidog Web Platform
MediumCVE-2026-1622: CWE-532 Insertion of Sensitive Information into Log File in neo4j Enterprise Edition
MediumCVE-2026-1370: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in comprassibs SIBS woocommerce payment gateway
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.