The flaws, tracked as CVE-2025-0285 to CVE-2025-0289, enable attackers to manipulate kernel memory, dereference null pointers, and bypass security controls, even on devices where Paragon software is not installed.
The BioNTdrv.sys driver, integral to Paragon’s disk management tools, contains five memory corruption flaws discovered by Microsoft researchers.
These include:
memmove function, allowing privilege escalation.MasterLrp structure in input buffers, enabling arbitrary kernel code execution.MappedSystemVa pointers passed to HalReturnToFirmware, actively exploited ransomware campaigns.Attackers leverage Bring Your Own Vulnerable Driver (BYOVD) tactics to deploy the Microsoft-signed driver, bypassing detection and gaining SYSTEM-level privileges.
This technique allows ransomware operators to terminate security processes, disable defenses, and deploy payloads.
Microsoft confirmed observing CVE-2025-0289 in ransomware attacks, where threat actors combine the vulnerable driver with malicious code to hijack systems.
Local access is sufficient to trigger denial-of-service (DoS) conditions, such as crashes (e.g., Blue Screen of Death), or escalate privileges for lateral movement.
The driver’s kernel-level access permits direct manipulation of hardware resources, making it a high-value target for advanced adversaries.
Paragon Software released BioNTdrv.sys version 2.0.0 in updates for its Hard Disk Manager line (version 17.45.0+), which restricts IOCTL commands and enforces SDDL permissions to limit driver access to administrators.
Additionally, Microsoft added vulnerable driver versions to its Vulnerable Driver Blocklist, enabled by default on Windows 11.
Organizations must:
While patches mitigate the immediate threat, systems running legacy Windows versions (e.g., Windows 7/8.1) remain vulnerable due to incompatible driver signatures.
Cybersecurity experts urge enterprises to prioritize patch deployment and enforce strict endpoint monitoring to counter BYOVD tactics, which remain a staple in ransomware operations.
The exploitation of these flaws underscores the risks posed by third-party kernel drivers and the critical need for robust vulnerability management in increasingly complex IT ecosystems.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post Paragon Hard Disk Manager Vulnerability Enables Privilege Escalation and DoS Attacks appeared first on Cyber Security News.
More big corporate shakeups are happening inside Microsoft. Kiki Wolfkill, art director, producer, and veteran…
Organized fraud networks are now using a new method to move stolen money in France.…
A newly discovered malware called Lotus Wiper has been used in a targeted destructive attack…
A North Korea-linked threat group is quietly getting hired by real companies. Jasper Sleet, a…
STAUNTON, Va. (WOWO) — Former Navy SEAL trainee and Indiana native Dustin “Dusty” Turner is…
INDIANAPOLIS, Ind. (WOWO) — The month of May is nearly here and a few IndyCar…
This website uses cookies.