Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1995: CWE-269 Improper Privilege Management in IDrive IDrive Cloud Backup Client for Windows

0
High
VulnerabilityCVE-2026-1995cvecve-2026-1995cwe-269
Published: Tue Mar 24 2026 (03/24/2026, 18:00:15 UTC)
Source: CVE Database V5
Vendor/Project: IDrive
Product: IDrive Cloud Backup Client for Windows

Description

CVE-2026-1995 is a high-severity privilege escalation vulnerability in the IDrive Cloud Backup Client for Windows. The id_service. exe process runs with SYSTEM privileges and reads configuration files from C:\ProgramData\IDrive\ that are writable by standard users. These files contain UTF16-LE encoded arguments used to launch processes. An attacker with standard user access can modify these files to specify an arbitrary executable path, causing id_service. exe to execute malicious code with SYSTEM privileges. This vulnerability requires local access but no user interaction and can lead to full system compromise. No known exploits are currently reported in the wild. Organizations using IDrive Cloud Backup on Windows should prioritize patching or applying mitigations to prevent unauthorized local privilege escalation. The CVSS score is 7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:24:43 UTC

Technical Analysis

CVE-2026-1995 is a vulnerability classified under CWE-269 (Improper Privilege Management) affecting the IDrive Cloud Backup Client for Windows. The core issue arises because the id_service.exe process, which runs with SYSTEM-level privileges, reads several UTF16-LE encoded files located in the C:\ProgramData\IDrive\ directory. These files are used as arguments to start other processes. However, these files are writable by any standard user on the system, which violates the principle of least privilege and secure file permissions. An attacker who has local access to the system but only standard user privileges can modify these files to specify a path to an arbitrary executable. When id_service.exe reads these manipulated files, it will launch the specified executable with SYSTEM privileges, effectively allowing privilege escalation from a standard user to SYSTEM. This vulnerability does not require user interaction and can be exploited with low complexity, given local access. The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity due to its impact on confidentiality, integrity, and availability. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported. The vulnerability was published on March 24, 2026, and is currently in the published state. The lack of proper access control on configuration files used by a high-privilege service is the root cause, highlighting a failure in secure privilege management and file permission enforcement.

Potential Impact

The primary impact of CVE-2026-1995 is local privilege escalation, allowing an attacker with standard user access to gain SYSTEM-level privileges on affected Windows systems running the IDrive Cloud Backup Client. This can lead to full system compromise, including the ability to install persistent malware, disable security controls, access sensitive data, and move laterally within a network. The compromise of backup client software is particularly concerning because it may have access to backup data and system restore functions, potentially enabling attackers to tamper with backups or evade detection. Organizations relying on IDrive Cloud Backup for Windows are at risk of internal threat actors or malware that gains limited access escalating privileges and causing significant damage. The vulnerability affects confidentiality, integrity, and availability of systems and data. Although exploitation requires local access, the ease of exploitation and high privileges gained make this a critical risk in environments where multiple users share systems or where endpoint security is weak.

Mitigation Recommendations

To mitigate CVE-2026-1995, organizations should immediately review and restrict file permissions on the C:\ProgramData\IDrive\ directory and all files within it to prevent modification by standard users. Specifically, ensure that only SYSTEM and administrators have write access to these files. If possible, disable or uninstall the IDrive Cloud Backup Client on systems where it is not essential. Monitor systems for unexpected process launches by id_service.exe or unusual modifications to the configuration files. Implement application whitelisting to prevent execution of unauthorized binaries by high-privilege processes. Coordinate with IDrive to obtain and apply official patches or updates once available. Consider deploying endpoint detection and response (EDR) solutions to detect suspicious local privilege escalation attempts. Educate users about the risks of local access and enforce strict access controls on shared systems. Additionally, conduct regular audits of file permissions and service configurations to detect similar privilege management issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
certcc
Date Reserved
2026-02-05T16:44:28.604Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c2d884f4197a8e3b5f963a

Added to database: 3/24/2026, 6:31:32 PM

Last enriched: 3/31/2026, 8:24:43 PM

Last updated: 5/8/2026, 1:12:10 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses