Description
An issue was discovered in DriveLock 24.1 through 24.1.*, 24.2 through 24.2.*, and 25.1 before 25.1.6. Users with the "Manage roles and permissions" privilege can promote themselves or other DOC users to the Supervisor role through an API call. This privilege is included by default in the Administrator role. This issue mainly affects cloud multi-tenant deployments; on-prem single-tenant installations are typically not impacted because local admins usually already have Supervisor privileges.
INFO
Published Date :
2025-12-17T00:00:00.000Z
Last Modified :
2025-12-18T19:53:06.200Z
Source :
mitre
AFFECTED PRODUCTS
The following products are affected by CVE-2025-67793 vulnerability.
| Vendors | Products |
|---|---|
| Drivelock |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-67793.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact