Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67790: n/a

0
Unknown
VulnerabilityCVE-2025-67790cvecve-2025-67790
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in DriveLock 24.1 before 24.1.6, 24.2 before 24.2.7, and 25.1 before 25.1.5. An unprivileged user could cause occasionally a Blue Screen Of Death (BSOD) on Windows computers by using an IOCTL and an unterminated string.

AI-Powered Analysis

AILast updated: 12/17/2025, 21:14:40 UTC

Technical Analysis

CVE-2025-67790 is a denial-of-service vulnerability found in DriveLock versions 24.1 before 24.1.6, 24.2 before 24.2.7, and 25.1 before 25.1.5. The flaw arises when an unprivileged local user sends a specially crafted IOCTL (Input Output Control) request containing an unterminated string to the DriveLock driver on Windows systems. This malformed input can cause the driver to mishandle the string, leading to a system crash manifested as a Blue Screen of Death (BSOD). The vulnerability does not require elevated privileges or authentication, but exploitation is limited to users with local access to the machine. The intermittent nature of the BSOD suggests a race condition or improper string handling in kernel mode. DriveLock is a security product used primarily for device control, data loss prevention, and endpoint security in enterprise environments. Although no public exploits or patches have been released yet, the vulnerability poses a risk to system availability and stability. The lack of a CVSS score indicates that the vulnerability is newly disclosed and pending further analysis. The vulnerability affects Windows endpoints running vulnerable DriveLock versions, potentially disrupting business operations if exploited by malicious insiders or unauthorized local users.

Potential Impact

For European organizations, exploitation of CVE-2025-67790 could result in unexpected system crashes causing denial of service on affected endpoints. This can disrupt business continuity, especially in environments where DriveLock is deployed to secure critical systems or sensitive data. The vulnerability could be leveraged by malicious insiders or attackers with local access to cause operational downtime or interrupt security monitoring functions provided by DriveLock. While confidentiality and integrity are not directly impacted, availability degradation can affect productivity and incident response capabilities. Organizations in sectors such as finance, healthcare, manufacturing, and government that rely on DriveLock for endpoint security may experience increased risk of disruption. The absence of remote exploitation limits the threat to local users, but insider threats or compromised endpoints remain a concern. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available.

Mitigation Recommendations

Organizations should prioritize updating DriveLock to versions 24.1.6, 24.2.7, or 25.1.5 or later once patches are released by the vendor. Until patches are available, restrict local user access on systems running vulnerable DriveLock versions to trusted personnel only. Implement strict endpoint access controls and monitor for unusual IOCTL requests or system crashes that could indicate exploitation attempts. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior related to device control drivers. Conduct regular audits of user privileges to minimize the number of unprivileged users with local access. Additionally, maintain robust backup and recovery procedures to mitigate the impact of potential denial-of-service conditions. Engage with DriveLock support for early access to patches or workarounds. Finally, educate IT staff about this vulnerability to ensure rapid response if exploitation signs appear.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69431b97fab815a9fc199cc3

Added to database: 12/17/2025, 9:07:35 PM

Last enriched: 12/17/2025, 9:14:40 PM

Last updated: 12/18/2025, 6:37:17 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats