An issue was discovered in DriveLock 24.1 through 24.1.*, 24.2 through 24.2.*, and 25.1 before 25.1.6. Users with the "Manage roles and permissions" privilege can promote themselves or other DOC users to the Supervisor role through an API call. This privilege is included by default in the Administrator role. This issue mainly affects cloud multi-tenant deployments; on-prem single-tenant installations are typically not impacted because local admins usually already have Supervisor privileges.
References
| Link | Resource |
|---|---|
| https://drivelock.help/sb/Content/SecurityBulletins/25-008-DESPrivilegeEsc.htm | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-12-17 21:16
Updated : 2026-01-02 15:54
NVD link : CVE-2025-67793
Mitre link : CVE-2025-67793
CVE.ORG link : CVE-2025-67793
JSON object : View
Products Affected
drivelock
- drivelock
CWE
CWE-269
Improper Privilege Management
