Cyber Posture

CVE-2025-0285

High

Published: 03 March 2025

Published
03 March 2025
Modified
25 June 2025
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0285 is a high-severity Improper Validation of Specified Quantity in Input (CWE-1284) vulnerability in Paragon-Software Paragon Backup \& Recovery. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 28.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the vulnerability by requiring identification, reporting, and timely patching of the flaw in biontdrv.sys as recommended by Paragon and CERT/CC.

prevent

Mandates information input validation mechanisms at system interfaces to counter the failure to validate user-supplied data lengths leading to arbitrary kernel memory mapping.

prevent

Implements controls to protect kernel memory from unauthorized access and compromise, mitigating the impact of arbitrary kernel memory mapping exploits.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability is a local kernel driver flaw enabling arbitrary kernel memory mapping for privilege escalation from low-privileged user context.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Various Paragon Software products contain an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits.

Deeper analysisAI

CVE-2025-0285 is an arbitrary kernel memory mapping vulnerability in the biontdrv.sys driver, affecting various Paragon Software products, including those in the Hard Disk Manager product line. The flaw arises from a failure to properly validate the length of user-supplied data (CWE-1284), enabling potential privilege escalation exploits. It has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

A local attacker with low privileges can exploit this vulnerability by supplying malformed data to the driver, allowing arbitrary kernel memory mapping. Successful exploitation leads to privilege escalation, providing high impacts on confidentiality, integrity, and availability.

Paragon Software has issued a security patch for biontdrv.sys across all Hard Disk Manager products, as outlined in their advisory. Further details on mitigation are available from CERT/CC (VU#726882) and Paragon's support patches page, recommending immediate application of the update to affected systems.

Details

CWE(s)

Affected Products

paragon-software
paragon backup \& recovery
15 — 17.39
paragon-software
paragon disk wiper
15 — 16
paragon-software
paragon drive copy
15 — 16
paragon-software
paragon hard disk manager
15 — 17.39
paragon-software
paragon migrate os to ssd
4 — 5
paragon-software
paragon partition manager
15 — 17.39

CVEs Like This One

CVE-2025-0286Same product: Paragon-Software Paragon Backup \& Recovery
CVE-2025-0289Same product: Paragon-Software Paragon Backup \& Recovery
CVE-2025-0288Same product: Paragon-Software Paragon Backup \& Recovery
CVE-2024-55407Shared CWE-1284
CVE-2026-25345Shared CWE-1284
CVE-2021-47827Shared CWE-1284
CVE-2026-1092Shared CWE-1284
CVE-2023-54337Shared CWE-1284
CVE-2026-40093Shared CWE-1284
CVE-2024-30516Shared CWE-1284

References