CVE Vulnerabilities

CVE-2025-67793

Improper Privilege Management

Published: Dec 17, 2025 | Modified: Jan 02, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An issue was discovered in DriveLock 24.1 through 24.1., 24.2 through 24.2., and 25.1 before 25.1.6. Users with the Manage roles and permissions privilege can promote themselves or other DOC users to the Supervisor role through an API call. This privilege is included by default in the Administrator role. This issue mainly affects cloud multi-tenant deployments; on-prem single-tenant installations are typically not impacted because local admins usually already have Supervisor privileges.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
DrivelockDrivelock24.1 (including)24.1.6 (including)
DrivelockDrivelock24.2 (including)24.2.8 (including)
DrivelockDrivelock25.1 (including)25.1.6 (excluding)

Potential Mitigations

References