{"uuid": "acbd3f0b-77d3-48e8-96f4-87c98285cd87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0288", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10998", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0288\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Paragon Partition Manager version 17.9.1 contains an arbitrary kernel memory vulnerability facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation.\n\ud83d\udccf Published: 2025-03-03T16:24:54.853Z\n\ud83d\udccf Modified: 2025-04-08T20:38:21.890Z\n\ud83d\udd17 References:\n1. https://www.kb.cert.org/vuls/id/726882\n2. https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys\n3. https://www.paragon-software.com/support/#patches", "creation_timestamp": "2025-04-08T20:46:39.000000Z"}