Microsoft had found 5 Paragon Partition Supervisor BioNTdrv.sys driver flaws, with one utilized by ransomware gangs in zero-day assaults to achieve SYSTEM privileges in Home windows.
The weak drivers had been exploited in ‘Deliver Your Personal Susceptible Driver’ (BYOVD) assaults the place risk actors drop the kernel driver on a focused system to raise privileges.
“An attacker with native entry to a tool can exploit these vulnerabilities to escalate privileges or trigger a denial-of-service (DoS) state of affairs on the sufferer’s machine,” explains a warning from CERT/CC.
“Moreover, because the assault includes a Microsoft-signed Driver, an attacker can leverage a Deliver Your Personal Susceptible Driver (BYOVD) method to use methods even when Paragon Partition Supervisor is just not put in. “
As BioNTdrv.sys is a kernel-level driver, risk actors can exploit vulnerabilities to execute instructions with the identical privileges as the motive force, bypassing protections and safety software program.
Microsoft researchers found all 5 flaws, noting that certainly one of them, CVE-2025-0289, is leveraged in assaults by ransomware teams. Nevertheless, the researchers didn’t disclose what ransomware gangs had been exploiting the flaw as a zero-day.
“Microsoft has noticed risk actors (TAs) exploiting this weak spot in BYOVD ransomware assaults, particularly utilizing CVE-2025-0289 to realize privilege escalation to SYSTEM stage, then execute additional malicious code,” reads the CERT/CC bulletin.
“These vulnerabilities have been patched by each Paragon Software program, and weak BioNTdrv.sys variations blocked by Microsoft’s Susceptible Driver Blocklist.”
The Paragon Partition Supervisor flaws found by Microsoft are:
- CVE-2025-0288 – Arbitrary kernel reminiscence write attributable to the improper dealing with of the ‘memmove’ perform, permitting attackers to write down to kernel reminiscence and escalate privileges.
- CVE-2025-0287 – Null pointer dereference arising from a lacking validation of a ‘MasterLrp’ construction within the enter buffer, enabling the execution of arbitrary kernel code.
- CVE-2025-0286 – Arbitrary kernel reminiscence write attributable to the improper validation of user-supplied information lengths, permitting attackers to execute arbitrary code.
- CVE-2025-0285 – Arbitrary kernel reminiscence mapping attributable to the failure to validate user-supplied information, enabling privilege escalation by manipulating kernel reminiscence mappings.
- CVE-2025-0289 – Insecure kernel useful resource entry attributable to the failure to validate the ‘MappedSystemVa’ pointer earlier than passing it to ‘HalReturnToFirmware,’ resulting in potential compromise of system sources.
The primary 4 vulnerabilities impression Paragon Partition Supervisor variations 7.9.1 and former, whereas CVE-2025-0298, the actively exploited flaw, impacts model 17 and older.
Customers of the software program are advisable to improve to the newest model, which accommodates BioNTdrv.sys model 2.0.0, which addresses the entire talked about flaws.
Nevertheless, it is essential to notice that even customers who haven’t got Paragon Partition Supervisor put in are usually not protected from assaults. BYOVD techniques do not depend on the software program being current on the goal’s machine.
As an alternative, risk actors embrace the weak driver with their very own instruments, permitting them to load it into Home windows and escalate privileges.
Microsoft has up to date its ‘Susceptible Driver Blocklist’ to dam the motive force from loading in Home windows, so customers and organizations ought to confirm the safety system is energetic.
You’ll be able to verify if the blocklist is enabled by going to Settings → Privateness & safety → Home windows Safety → System safety → Core isolation → Microsoft Susceptible Driver Blocklist and ensuring the setting is enabled.
.jpg)
Supply: BleepingComputer
A warning on Paragon Software program’s web site additionally warns that customers should improve Paragon Onerous Disk Supervisor by at this time, because it makes use of the identical driver, which can be blocked by Microsoft at this time.
Whereas it’s unclear what ransomware gangs are exploiting the Paragon flaw, BYOVD assaults have turn into more and more in style amongst cybercriminals as they permit them to simply acquire SYSTEM privileges on Home windows gadgets.
Menace actors recognized to be using BYOVD assaults embrace Scattered Spider, Lazarus, BlackByte ransomware, LockBit ransomware, and lots of extra.
Because of this, you will need to allow the Microsoft Susceptible Driver Blocklist characteristic to stop weak drivers from getting used in your Home windows gadgets.