Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-5568 Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 26 Jun 2025 02:15:00 +0900

Type Values Removed Values Added
First Time appeared Paragon-software
Paragon-software paragon Backup \& Recovery
Paragon-software paragon Disk Wiper
Paragon-software paragon Drive Copy
Paragon-software paragon Hard Disk Manager
Paragon-software paragon Migrate Os To Ssd
Paragon-software paragon Partition Manager
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:paragon-software:paragon_backup_\&_recovery:*:*:*:*:*:*:*:*
cpe:2.3:a:paragon-software:paragon_disk_wiper:*:*:*:*:*:*:*:*
cpe:2.3:a:paragon-software:paragon_drive_copy:*:*:*:*:*:*:*:*
cpe:2.3:a:paragon-software:paragon_hard_disk_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:paragon-software:paragon_migrate_os_to_ssd:*:*:*:*:*:*:*:*
cpe:2.3:a:paragon-software:paragon_partition_manager:*:*:*:*:*:*:*:*
Vendors & Products Paragon-software
Paragon-software paragon Backup \& Recovery
Paragon-software paragon Disk Wiper
Paragon-software paragon Drive Copy
Paragon-software paragon Hard Disk Manager
Paragon-software paragon Migrate Os To Ssd
Paragon-software paragon Partition Manager

Tue, 15 Apr 2025 05:30:00 +0900

Type Values Removed Values Added
Description Paragon Partition Manager version 17.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation. Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation.

Fri, 28 Mar 2025 04:00:00 +0900

Type Values Removed Values Added
Description Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation. Paragon Partition Manager version 17.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation.

Wed, 26 Mar 2025 00:15:00 +0900

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 13 Mar 2025 02:45:00 +0900

Type Values Removed Values Added
Weaknesses CWE-131
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 05 Mar 2025 22:45:00 +0900

Type Values Removed Values Added
References

Wed, 05 Mar 2025 01:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-131
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 04 Mar 2025 01:30:00 +0900

Type Values Removed Values Added
Description Paragon Partition Manager version 7.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation.
Title CVE-2025-0288
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2025-09-09T14:00:21.687Z

Reserved: 2025-01-06T19:15:19.554Z

Link: CVE-2025-0288

cve-icon Vulnrichment

Updated: 2025-03-04T15:20:17.348Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-03T17:15:13.823

Modified: 2025-06-25T16:49:22.483

Link: CVE-2025-0288

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses