Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Idrive
Idrive idrive Cloud Backup Client For Windows |
|
| Vendors & Products |
Idrive
Idrive idrive Cloud Backup Client For Windows |
Tue, 24 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 24 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IDrive’s id_service.exe process runs with elevated privileges and regularly reads from several files under the C:\ProgramData\IDrive\ directory. The UTF16-LE encoded contents of these files are used as arguments for starting a process, but they can be edited by any standard user logged into the system. An attacker can overwrite or edit the files to specify a path to an arbitrary executable, which will then be executed by the id_service.exe process with SYSTEM privileges. | |
| Title | IDrive Cloud Backup Client for Windows contains a privilege escalation vulnerability | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-03-25T13:14:39.639Z
Reserved: 2026-02-05T16:44:28.604Z
Link: CVE-2026-1995
Updated: 2026-03-24T19:24:11.136Z
Status : Awaiting Analysis
Published: 2026-03-24T19:16:49.033
Modified: 2026-03-25T15:41:58.280
Link: CVE-2026-1995
No data.
OpenCVE Enrichment
Updated: 2026-03-25T20:49:35Z
No weakness.