Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation.
References
Configurations
Configuration 1 (hide)
|
History
25 Jun 2025, 16:49
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | () https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys - Vendor Advisory | |
References | () https://www.kb.cert.org/vuls/id/726882 - Third Party Advisory | |
References | () https://www.paragon-software.com/support/#patches - Product | |
First Time |
Paragon-software paragon Partition Manager
Paragon-software paragon Migrate Os To Ssd Paragon-software paragon Disk Wiper Paragon-software paragon Drive Copy Paragon-software Paragon-software paragon Backup \& Recovery Paragon-software paragon Hard Disk Manager |
|
CPE | cpe:2.3:a:paragon-software:paragon_hard_disk_manager:*:*:*:*:*:*:*:* cpe:2.3:a:paragon-software:paragon_partition_manager:*:*:*:*:*:*:*:* cpe:2.3:a:paragon-software:paragon_backup_\&_recovery:*:*:*:*:*:*:*:* cpe:2.3:a:paragon-software:paragon_migrate_os_to_ssd:*:*:*:*:*:*:*:* cpe:2.3:a:paragon-software:paragon_drive_copy:*:*:*:*:*:*:*:* cpe:2.3:a:paragon-software:paragon_disk_wiper:*:*:*:*:*:*:*:* |
14 Apr 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation. |
27 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Paragon Partition Manager version 17.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation. |
25 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
12 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
05 Mar 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
04 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-131 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
03 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-03 17:15
Updated : 2025-06-25 16:49
NVD link : CVE-2025-0288
Mitre link : CVE-2025-0288
CVE.ORG link : CVE-2025-0288
JSON object : View
Products Affected
paragon-software
- paragon_disk_wiper
- paragon_migrate_os_to_ssd
- paragon_partition_manager
- paragon_drive_copy
- paragon_hard_disk_manager
- paragon_backup_\&_recovery
CWE