Security Bulletin #25-006 — DES: Misconfiguration leading to Arbitrary Agent Impersonation (CVE request)
First published: 2025-09-25
Last updated: 2025-09-29
CVE: CVE-2025-XXXXX (requested) — official record will be available on MITRE once published.
CVSS Score: MEDIUM 5.3 – CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
Affected product(s): DriveLock SE — DriveLock Enterprise Service (DES) (see versions below)
Disclosure status: Coordinated
Vulnerability type / classification: Misconfiguration (Agent Authentication)
Attack type: Remote
Attack vector: Network
Summary
Due to incomplete agent configuration in the DOC, attackers can impersonate DriveLock Agents against the DriveLock Enterprise Service (DES) and upload files into arbitrary tenants via the trace file functionality.
Description
If not configured properly in the DriveLock Operations Center (DOC), a configuration weakness exists in regard to the agent authentication process. This misconfiguration allows somebody to impersonate DriveLock agents against the DES by exploiting the trace file functionality.
Mitigation
Correct agent authentication configuration (DOC Config Installation Checkboxes).
Fixed in
-
n/a
References
-
CVE-2025-XXXXX (requested) — official record will be available on MITRE once published.
How to update your environment
n/a
Additionally, regardless of this specific issue, we always recommend using the latest release of DriveLock to benefit from ongoing improvements and security enhancements.
A CVE has been requested and is currently under review by an official CNA authority. We will inform you once it is published.