{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-0288","assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","state":"PUBLISHED","assignerShortName":"certcc","dateReserved":"2025-01-06T19:15:19.554Z","datePublished":"2025-03-03T16:24:54.853Z","dateUpdated":"2025-09-09T14:00:21.687Z"},"containers":{"cna":{"title":"CVE-2025-0288","descriptions":[{"lang":"en","value":"Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation."}],"source":{"discovery":"UNKNOWN"},"affected":[{"vendor":"Paragon Software","product":"Migrate OS to SSD","versions":[{"status":"affected","version":"4","lessThanOrEqual":"5","versionType":"custom"}]},{"vendor":"Paragon Software","product":"Disk Wiper","versions":[{"status":"affected","version":"15","lessThanOrEqual":"16","versionType":"custom"}]},{"vendor":"Paragon Software","product":"Drive Copy","versions":[{"status":"affected","version":"15","lessThanOrEqual":"16","versionType":"custom"}]},{"vendor":"Paragon Software","product":"Backup and Recovery","versions":[{"status":"affected","version":"15","lessThanOrEqual":"17.39","versionType":"custom"}]},{"vendor":"Paragon Software","product":"Hard Disk Manager","versions":[{"status":"affected","version":"15","lessThanOrEqual":"17.39","versionType":"custom"}]},{"vendor":"Paragon Software","product":"Partition Manager","versions":[{"status":"affected","version":"15","lessThanOrEqual":"17.39","versionType":"custom"}]}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-131 Incorrect Calculation of Buffer Size"}]}],"references":[{"url":"https://www.kb.cert.org/vuls/id/726882"},{"url":"https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys"},{"url":"https://www.paragon-software.com/support/#patches"}],"x_generator":{"engine":"VINCE 3.0.24","env":"prod","origin":"https://cveawg.mitre.org/api/cve/CVE-2025-0288"},"providerMetadata":{"orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc","dateUpdated":"2025-09-05T12:08:49.317Z"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-03-04T15:19:14.562640Z","id":"CVE-2025-0288","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-09T14:00:21.687Z"}}]}}