Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67793: n/a

0
Critical
VulnerabilityCVE-2025-67793cvecve-2025-67793
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in DriveLock 24.1 through 24.1.*, 24.2 through 24.2.*, and 25.1 before 25.1.6. Users with the "Manage roles and permissions" privilege can promote themselves or other DOC users to the Supervisor role through an API call. This privilege is included by default in the Administrator role. This issue mainly affects cloud multi-tenant deployments; on-prem single-tenant installations are typically not impacted because local admins usually already have Supervisor privileges.

AI-Powered Analysis

AILast updated: 12/24/2025, 21:36:09 UTC

Technical Analysis

CVE-2025-67793 is a critical security vulnerability discovered in multiple versions of DriveLock, a security and endpoint management solution. The flaw exists in the API handling of role and permission management, where users granted the 'Manage roles and permissions' privilege—which is included by default in the Administrator role—can escalate their privileges by promoting themselves or other DOC users to the Supervisor role. The Supervisor role likely has elevated permissions that allow full control over the system, including sensitive configurations and data. This vulnerability is particularly impactful in cloud multi-tenant deployments where multiple customers share the same infrastructure, as it allows an attacker with limited administrative privileges to gain higher-level access across the environment. On-premises single-tenant deployments are less affected because local administrators typically already have Supervisor privileges, reducing the impact of this escalation. The vulnerability is categorized under CWE-269 (Improper Privilege Management), indicating a failure to properly restrict privilege elevation. The CVSS 3.1 base score is 9.8, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning it is remotely exploitable over the network without authentication or user interaction, and it impacts confidentiality, integrity, and availability at a high level. No patches or exploit code are currently publicly available, but the severity demands urgent attention. Organizations using DriveLock cloud services should review their role assignments and apply updates as soon as they become available to mitigate this risk.

Potential Impact

For European organizations, the impact of CVE-2025-67793 is substantial, especially for those utilizing DriveLock in cloud multi-tenant environments. Successful exploitation allows attackers to gain Supervisor-level privileges, potentially leading to full administrative control over endpoint security configurations, access to sensitive data, and the ability to disrupt security policies or availability of services. This could result in data breaches, compliance violations (e.g., GDPR), and operational disruptions. The ease of exploitation without authentication or user interaction increases the risk of automated or targeted attacks. Organizations in sectors with stringent security requirements, such as finance, healthcare, and critical infrastructure, face heightened risks. Furthermore, multi-tenant cloud environments used by managed service providers or large enterprises increase the attack surface and potential for lateral movement across tenants. The vulnerability could also undermine trust in cloud security solutions, impacting business continuity and reputation.

Mitigation Recommendations

To mitigate CVE-2025-67793, European organizations should immediately audit user roles and permissions within DriveLock, particularly focusing on users with the 'Manage roles and permissions' privilege. Restrict this privilege to the minimum number of trusted administrators and monitor for any unusual role changes or promotions. Implement strict API access controls and logging to detect unauthorized privilege escalations. Where possible, isolate critical workloads and sensitive data to reduce the blast radius of a compromised account. Organizations should apply vendor patches or updates as soon as they are released; if patches are not yet available, consider temporary compensating controls such as disabling API access for role management or enforcing multi-factor authentication for administrative actions. Regularly review and update security policies to enforce least privilege principles. Additionally, conduct security awareness training for administrators to recognize and report suspicious activities. Engage with DriveLock support to obtain guidance on interim fixes or workarounds. Finally, integrate this vulnerability into incident response plans to ensure rapid containment if exploitation is detected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-12T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69431987c9138a40d2f66457

Added to database: 12/17/2025, 8:58:47 PM

Last enriched: 12/24/2025, 9:36:09 PM

Last updated: 2/4/2026, 3:41:21 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats