In DriveLock 24.1.4 before 24.1.5, 24.2.5 before 24.2.6, and 25.1.2 before 25.1.4, attackers can gain elevated privileges.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Drivelock | Drivelock | 24.1.4 (including) | 24.1.4 (including) |
Drivelock | Drivelock | 24.2.5 (including) | 24.2.5 (including) |
Drivelock | Drivelock | 25.1.2 (including) | 25.1.2 (including) |