CVE-2025-0288

Published Mar 3, 2025

Last updated 4 months ago

Overview

Description
Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation.
Source
cret@cert.org
NVD status
Analyzed
Products
paragon_backup_\&_recovery, paragon_disk_wiper, paragon_drive_copy, paragon_hard_disk_manager, paragon_migrate_os_to_ssd, paragon_partition_manager

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

nvd@nist.gov
NVD-CWE-noinfo

Social media

Hype score
Not currently trending

Configurations