Paragon Hard Disk Manager Vulnerability Enables Privilege Escalation and DoS Attacks

A series of critical vulnerabilities in Paragon Software’s Hard Disk Manager (HDM) product line, specifically within its BioNTdrv.sys kernel-level driver, are being actively exploited by ransomware groups to escalate privileges and execute malicious code on Windows systems.

The flaws, tracked as CVE-2025-0285 to CVE-2025-0289, enable attackers to manipulate kernel memory, dereference null pointers, and bypass security controls, even on devices where Paragon software is not installed.

Technical Breakdown of Vulnerabilities

The BioNTdrv.sys driver, integral to Paragon’s disk management tools, contains five memory corruption flaws discovered by Microsoft researchers.

These include:

  • CVE-2025-0288: Arbitrary kernel memory write via improper handling of the memmove function, allowing privilege escalation.
  • CVE-2025-0287: Null pointer dereference due to missing validation of the MasterLrp structure in input buffers, enabling arbitrary kernel code execution.
  • CVE-2025-0286: Arbitrary kernel memory write via unvalidated user-supplied data lengths.
  • CVE-2025-0285: Arbitrary kernel memory mapping due to insufficient input validation, facilitating privilege escalation.
  • CVE-2025-0289: Insecure kernel resource access caused by unvalidated MappedSystemVa pointers passed to HalReturnToFirmware, actively exploited ransomware campaigns.

Attackers leverage Bring Your Own Vulnerable Driver (BYOVD) tactics to deploy the Microsoft-signed driver, bypassing detection and gaining SYSTEM-level privileges.

This technique allows ransomware operators to terminate security processes, disable defenses, and deploy payloads.

Impact and Exploitation

Microsoft confirmed observing CVE-2025-0289 in ransomware attacks, where threat actors combine the vulnerable driver with malicious code to hijack systems. 

Local access is sufficient to trigger denial-of-service (DoS) conditions, such as crashes (e.g., Blue Screen of Death), or escalate privileges for lateral movement. 

The driver’s kernel-level access permits direct manipulation of hardware resources, making it a high-value target for advanced adversaries.

Mitigation and Patching

Paragon Software released BioNTdrv.sys version 2.0.0 in updates for its Hard Disk Manager line (version 17.45.0+), which restricts IOCTL commands and enforces SDDL permissions to limit driver access to administrators. 

Additionally, Microsoft added vulnerable driver versions to its Vulnerable Driver Blocklist, enabled by default on Windows 11. 

Organizations must:

  1. Update Paragon software immediately via the security patch.
  2. Verify Blocklist activation under Windows Security → Device Security → Core Isolation.
  3. Monitor for unauthorized privilege escalation attempts, particularly in environments with outdated Paragon tools.

Ongoing Risks and Recommendations

While patches mitigate the immediate threat, systems running legacy Windows versions (e.g., Windows 7/8.1) remain vulnerable due to incompatible driver signatures. 

Cybersecurity experts urge enterprises to prioritize patch deployment and enforce strict endpoint monitoring to counter BYOVD tactics, which remain a staple in ransomware operations.

The exploitation of these flaws underscores the risks posed by third-party kernel drivers and the critical need for robust vulnerability management in increasingly complex IT ecosystems.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here