Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Vulnerable Paragon Driver Exploited in Ransomware Attacks

Ransomware operators exploit a vulnerable Paragon driver in BYOVD attacks to elevate privileges to System.

Ransomware operators have been observed deploying a vulnerable Paragon Hard Disk Manager driver in attacks and exploiting it to elevate their privileges to System.

The driver, Biontdrv.sys, which is part of Hard Disk Manager and other products that rely on it, such as Paragon Partition Manager and Backup and Recovery, contains five vulnerabilities that allow attackers to elevate privileges or cause a denial-of-service (DoS) condition.

“Additionally, as the attack involves a Microsoft-signed driver, an attacker can leverage a Bring Your Own Vulnerable Driver (BYOVD) technique to exploit systems even if Paragon Partition Manager is not installed,” a CERT/CC advisory reads.

The security defects include an arbitrary kernel memory bug (CVE-2025-0288), a null pointer dereference issue (CVE-2025-0287), an arbitrary kernel memory write flaw (CVE-2025-0286), an arbitrary kernel memory mapping bug (CVE-2025-0285), and an insecure kernel resource access vulnerability (CVE-2025-0289).

The flaws impact Biontdrv.sys versions 1.3.0 and 1.5.1 and were addressed with the release of version 2.0.0 of the driver. Paragon included the fixes in Hard Disk Manager version 17.45.0 and released a standalone security patch to resolve the bugs in older product versions based on Hard Disk Manager.

The patch, however, is only available for Windows 10, Windows 11, and Windows Server 2016, 2019, 2022, and 2025 devices, as older platform iterations are deemed unsafe.

According to CERT/CC, the exploitation of Biontdrv.sys in BYOVD attacks by ransomware groups was flagged by Microsoft, which last week added the vulnerable versions of the driver to its Vulnerable Driver Blocklist.

“After February 28, 2025 several features of Paragon Hard Disk Manager won’t be available if the fixed version of the BioNTdrv.sys driver is not installed,” Paragon warned last week.

Advertisement. Scroll to continue reading.

Organizations and end-users are advised to update all impacted Paragon applications – including Hard Disk Manager, Partition Manager, Backup and Recovery, Drive Copy, Disk Wiper, and Migrate OS to SSD – or to apply the available security patch as soon as possible.

Related: Watch Now: Ransomware Resilience & Recovery Summit – All Sessions Available on Demand

Related: New Anubis Ransomware Could Pose Major Threat to Organizations

Related: CISA, FBI Warn of China-Linked Ghost Ransomware Attacks

Related: Ransomware Payments Dropped to $813 Million in 2024

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

Simon Forster has been named the new General Manager of DNS security firm Quad9.

Cybersecurity training company Immersive has named Mark Schmitz as its new CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.