An issue was discovered in DriveLock 24.1 through 24.1.*, 24.2 through 24.2.*, and 25.1 before 25.1.6. Users with the "Manage roles and permissions" privilege can promote themselves or other DOC users to the Supervisor role through an API call. This privilege is included by default in the Administrator role. This issue mainly affects cloud multi-tenant deployments; on-prem single-tenant installations are typically not impacted because local admins usually already have Supervisor privileges.
History

Thu, 18 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Drivelock
Drivelock drivelock
Vendors & Products Drivelock
Drivelock drivelock

Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description An issue was discovered in DriveLock 24.1 through 24.1.*, 24.2 through 24.2.*, and 25.1 before 25.1.6. Users with the "Manage roles and permissions" privilege can promote themselves or other DOC users to the Supervisor role through an API call. This privilege is included by default in the Administrator role. This issue mainly affects cloud multi-tenant deployments; on-prem single-tenant installations are typically not impacted because local admins usually already have Supervisor privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-18T19:53:06.200Z

Reserved: 2025-12-12T00:00:00.000Z

Link: CVE-2025-67793

cve-icon Vulnrichment

Updated: 2025-12-18T19:51:41.254Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2025-12-17T21:16:16.443

Modified: 2025-12-18T20:16:08.657

Link: CVE-2025-67793

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-18T09:57:06Z