Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-9721 | The kernel driver, accessible to low-privileged users, exposes a function that fails to properly validate the privileges of the calling process. This allows creating files at arbitrary locations with full user control, ultimately allowing for privilege escalation to SYSTEM. |
Mon, 07 Jul 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 04 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 04 Apr 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The kernel driver, accessible to low-privileged users, exposes a function that fails to properly validate the privileges of the calling process. This allows creating files at arbitrary locations with full user control, ultimately allowing for privilege escalation to SYSTEM. | |
| Title | Local Privilege Escalation in Virtual CloneDrive Kernel Driver | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: cirosec
Published:
Updated: 2025-07-07T20:49:02.467Z
Reserved: 2025-03-03T08:25:33.555Z
Link: CVE-2025-1865
Updated: 2025-04-04T14:24:44.841Z
Status : Deferred
Published: 2025-04-04T10:15:15.277
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-1865
No data.
OpenCVE Enrichment
No data.
EUVD