Search criteria

5 vulnerabilities by Paragon Software

CVE-2025-0285 (GCVE-0-2025-0285)

Vulnerability from cvelistv5 – Published: 2025-03-03 16:25 – Updated: 2025-09-09 13:57
VLAI?
Title
CVE-2025-0285
Summary
Various Paragon Software products contain an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits.
CWE
  • CWE-1287 - Improper Validation of Specified Type of Input
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-0285",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-04T15:15:31.228642Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-09T13:57:18.211Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Migrate OS to SSD",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "5",
              "status": "affected",
              "version": "4",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Disk Wiper",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "16",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Paragon Drive Copy",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "16",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Backup and Recovery",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Hard Disk Manager",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Partition Manager",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Various Paragon Software products contain an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-1287: Improper Validation of Specified Type of Input",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-05T12:07:05.461Z",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys"
        },
        {
          "url": "https://www.kb.cert.org/vuls/id/726882"
        },
        {
          "url": "https://www.paragon-software.com/support/#patches"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "CVE-2025-0285",
      "x_generator": {
        "engine": "VINCE 3.0.24",
        "env": "prod",
        "origin": "https://cveawg.mitre.org/api/cve/CVE-2025-0285"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2025-0285",
    "datePublished": "2025-03-03T16:25:38.704Z",
    "dateReserved": "2025-01-06T19:14:34.676Z",
    "dateUpdated": "2025-09-09T13:57:18.211Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0286 (GCVE-0-2025-0286)

Vulnerability from cvelistv5 – Published: 2025-03-03 16:25 – Updated: 2025-09-09 13:59
VLAI?
Title
CVE-2025-0286
Summary
Various Paragon Software products contain an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine.
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 8.4,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-0286",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-04T15:17:36.923218Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-09T13:59:49.755Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Partition Manager",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Hard Disk Manager",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Backup and Recovery",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Drive Copy",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "16",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Disk Wiper",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "16",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Migrate OS to SSD",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "5",
              "status": "affected",
              "version": "4",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Various Paragon Software products contain an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-05T12:07:38.613Z",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "url": "https://www.kb.cert.org/vuls/id/726882"
        },
        {
          "url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys"
        },
        {
          "url": "https://www.paragon-software.com/support/#patches"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "CVE-2025-0286",
      "x_generator": {
        "engine": "VINCE 3.0.24",
        "env": "prod",
        "origin": "https://cveawg.mitre.org/api/cve/CVE-2025-0286"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2025-0286",
    "datePublished": "2025-03-03T16:25:25.767Z",
    "dateReserved": "2025-01-06T19:14:51.646Z",
    "dateUpdated": "2025-09-09T13:59:49.755Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0287 (GCVE-0-2025-0287)

Vulnerability from cvelistv5 – Published: 2025-03-03 16:25 – Updated: 2025-09-05 12:08
VLAI?
Title
CVE-2025-0287
Summary
Various Paragon Software products contain a null pointer dereference vulnerability within biontdrv.sys that is caused by a lack of a valid MasterLrp structure in the input buffer, allowing an attacker to execute arbitrary code in the kernel, facilitating privilege escalation.
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 5.1,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-0287",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-03T19:22:13.884895Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-476",
                "description": "CWE-476 NULL Pointer Dereference",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-03T19:30:13.214Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Migrate OS to SSD",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "5",
              "status": "affected",
              "version": "4",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Disk Wiper",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "16",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Drive Copy",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "16",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Backup and Recovery",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Hard Disk Manager",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Partition Manager",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Various Paragon Software products contain a null pointer dereference vulnerability within biontdrv.sys that is caused by a lack of a valid MasterLrp structure in the input buffer, allowing an attacker to execute arbitrary code in the kernel, facilitating privilege escalation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-476 NULL Pointer Dereference",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-05T12:08:03.175Z",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys"
        },
        {
          "url": "https://www.kb.cert.org/vuls/id/726882"
        },
        {
          "url": "https://www.paragon-software.com/support/#patches"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "CVE-2025-0287",
      "x_generator": {
        "engine": "VINCE 3.0.24",
        "env": "prod",
        "origin": "https://cveawg.mitre.org/api/cve/CVE-2025-0287"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2025-0287",
    "datePublished": "2025-03-03T16:25:08.481Z",
    "dateReserved": "2025-01-06T19:15:09.799Z",
    "dateUpdated": "2025-09-05T12:08:03.175Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0288 (GCVE-0-2025-0288)

Vulnerability from cvelistv5 – Published: 2025-03-03 16:24 – Updated: 2025-09-09 14:00
VLAI?
Title
CVE-2025-0288
Summary
Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation.
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-0288",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-04T15:19:14.562640Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-09T14:00:21.687Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Migrate OS to SSD",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "5",
              "status": "affected",
              "version": "4",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Disk Wiper",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "16",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Drive Copy",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "16",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Backup and Recovery",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Hard Disk Manager",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Partition Manager",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-131 Incorrect Calculation of Buffer Size",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-05T12:08:49.317Z",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "url": "https://www.kb.cert.org/vuls/id/726882"
        },
        {
          "url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys"
        },
        {
          "url": "https://www.paragon-software.com/support/#patches"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "CVE-2025-0288",
      "x_generator": {
        "engine": "VINCE 3.0.24",
        "env": "prod",
        "origin": "https://cveawg.mitre.org/api/cve/CVE-2025-0288"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2025-0288",
    "datePublished": "2025-03-03T16:24:54.853Z",
    "dateReserved": "2025-01-06T19:15:19.554Z",
    "dateUpdated": "2025-09-09T14:00:21.687Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0289 (GCVE-0-2025-0289)

Vulnerability from cvelistv5 – Published: 2025-03-03 16:24 – Updated: 2025-09-09 14:03
VLAI?
Title
CVE-2025-0289
Summary
Various Paragon Software products contain an insecure kernel resource access vulnerability facilitated by the driver not validating the MappedSystemVa pointer before passing it to HalReturnToFirmware, which can allows an attacker the ability to compromise the service.
CWE
  • CWE-1287 - Improper Validation of Specified Type of Input
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-0289",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-04T15:21:49.572240Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-09T14:03:26.472Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Migrate OS to SSD",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "5",
              "status": "affected",
              "version": "4",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Disk Wiper",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "16",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Drive Copy",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "16",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Hard Disk Manager",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Backup and Recovery",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Partition Manager",
          "vendor": "Paragon Software",
          "versions": [
            {
              "lessThanOrEqual": "17.39",
              "status": "affected",
              "version": "15",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Various Paragon Software products contain an insecure kernel resource access vulnerability facilitated by the driver not validating the MappedSystemVa pointer before passing it to HalReturnToFirmware, which can allows an attacker the ability to compromise the service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-1287: Improper Validation of Specified Type of Input",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-05T12:08:26.359Z",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "url": "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys"
        },
        {
          "url": "https://www.kb.cert.org/vuls/id/726882"
        },
        {
          "url": "https://www.paragon-software.com/support/#patches"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "CVE-2025-0289",
      "x_generator": {
        "engine": "VINCE 3.0.24",
        "env": "prod",
        "origin": "https://cveawg.mitre.org/api/cve/CVE-2025-0289"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2025-0289",
    "datePublished": "2025-03-03T16:24:38.134Z",
    "dateReserved": "2025-01-06T19:15:26.403Z",
    "dateUpdated": "2025-09-09T14:03:26.472Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}