The flaws, tracked as CVE-2025-0285 to CVE-2025-0289, enable attackers to manipulate kernel memory, dereference null pointers, and bypass security controls, even on devices where Paragon software is not installed.
The BioNTdrv.sys driver, integral to Paragon’s disk management tools, contains five memory corruption flaws discovered by Microsoft researchers.
These include:
memmove function, MasterLrp structure in input buffers, enabling arbitrary kernel code execution.MappedSystemVa pointers passed to HalReturnToFirmware, actively exploited ransomware campaigns.Attackers leverage Bring Your Own Vulnerable Driver (BYOVD) tactics to deploy the Microsoft-signed driver, bypassing detection and gaining SYSTEM-level privileges.
This technique allows ransomware operators to terminate security processes, disable defenses, and deploy payloads.
Microsoft confirmed observing CVE-2025-0289 in ransomware attacks, where threat actors combine the vulnerable driver with malicious code to hijack systems.
Local access is sufficient to trigger denial-of-service (DoS) conditions, such as crashes (e.g., Blue Screen of Death), or escalate privileges for lateral movement.
The driver’s kernel-level access permits direct manipulation of hardware resources, making it a high-value target for advanced adversaries.
Paragon Software released BioNTdrv.sys version 2.0.0 in updates for its Hard Disk Manager line (version 17.45.0+), which restricts IOCTL commands and enforces SDDL permissions to limit driver access to administrators.
Additionally, Microsoft added vulnerable driver versions to its Vulnerable Driver Blocklist, enabled by default on Windows 11.
Organizations must:
While patches mitigate the immediate threat, systems running legacy Windows versions (e.g., Windows 7/8.1) remain vulnerable due to incompatible driver signatures.
Cybersecurity experts urge enterprises to prioritize patch deployment and enforce strict endpoint monitoring to counter BYOVD tactics, which remain a staple in ransomware operations.
The exploitation of these flaws underscores the risks posed by third-party kernel drivers and the critical need for robust vulnerability management in increasingly complex IT ecosystems.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post Paragon Hard Disk Manager Vulnerability Enables Privilege Escalation and DoS Attacks appeared first on Cyber Security News.
March 8, 2026 When you lead statewide economic development, the department’s annual conference is a…
“Good evening,” said Alfred Hitchcock to the television viewers of America on March 25, 1959.…
“Good evening,” said Alfred Hitchcock to the television viewers of America on March 25, 1959.…
The team behind Project Motor Racing has acknowledged the game did not meet expectations upon…
There are a handful of domains that don’t just describe a category — they own…
Large Language Models (LLMs) have moved quickly from research labs into real products. Chatbots, copilots,…
This website uses cookies.