7.8 CVE-2026-1995

Enriched by CISA
 

IDrive’s id_service.exe process runs with elevated privileges and regularly reads from several files under the C:ProgramDataIDrive directory. The UTF16-LE encoded contents of these files are used as arguments for starting a process, but they can be edited by any standard user logged into the system. An attacker can overwrite or edit the files to specify a path to an arbitrary executable, which will then be executed by the id_service.exe process with SYSTEM privileges.
https://nvd.nist.gov/vuln/detail/CVE-2026-1995

Categories

No category defined

References

af854a3a-2127-422b-91ae-364da2661108

cret@cert.org


 

AFFECTED (from MITRE)


Vendor Product Versions
IDrive IDrive Cloud Backup Client for Windows
  • < 7.0.0.63 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry