Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation.
References
Configurations
Configuration 1 (hide)
|
History
25 Jun 2025, 16:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:paragon-software:paragon_drive_copy:*:*:*:*:*:*:*:* cpe:2.3:a:paragon-software:paragon_hard_disk_manager:*:*:*:*:*:*:*:* cpe:2.3:a:paragon-software:paragon_disk_wiper:*:*:*:*:*:*:*:* cpe:2.3:a:paragon-software:paragon_migrate_os_to_ssd:*:*:*:*:*:*:*:* cpe:2.3:a:paragon-software:paragon_partition_manager:*:*:*:*:*:*:*:* cpe:2.3:a:paragon-software:paragon_backup_\&_recovery:*:*:*:*:*:*:*:* |
|
First Time |
Paragon-software paragon Hard Disk Manager
Paragon-software paragon Drive Copy Paragon-software paragon Backup \& Recovery Paragon-software paragon Migrate Os To Ssd Paragon-software paragon Partition Manager Paragon-software paragon Disk Wiper Paragon-software |
|
References | () https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys - Vendor Advisory | |
References | () https://www.kb.cert.org/vuls/id/726882 - Third Party Advisory | |
References | () https://www.paragon-software.com/support/#patches - Product | |
CWE | NVD-CWE-noinfo |
14 Apr 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation. |
27 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Paragon Partition Manager version 17.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation. |
25 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
12 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE |
05 Mar 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
04 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-131 |
03 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-03 17:15
Updated : 2025-06-25 16:49
NVD link : CVE-2025-0288
Mitre link : CVE-2025-0288
CVE.ORG link : CVE-2025-0288
JSON object : View
Products Affected
paragon-software
- paragon_drive_copy
- paragon_hard_disk_manager
- paragon_disk_wiper
- paragon_partition_manager
- paragon_backup_\&_recovery
- paragon_migrate_os_to_ssd
CWE