HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

SQL Injection Privilege Escalation in DriveLock (CVE‑2026‑5490) Enables Remote Privilege Escalation

DriveLock’s web service contains an authenticated SQL‑injection flaw (CVE‑2026‑5490) that allows attackers to elevate privileges to admin level. The issue scores 8.8 on CVSS and affects all pre‑patch installations, posing a supply‑chain risk for organizations that rely on DriveLock for endpoint encryption.

🛡️ LiveThreat™ Intelligence · 📅 April 16, 2026· 📰 zerodayinitiative.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
1 sector(s)
Actions
5 recommended
📰
Source
zerodayinitiative.com

SQL Injection Privilege Escalation in DriveLock (CVE‑2026‑5490) Enables Remote Privilege Escalation

What It Is – DriveLock’s web service (default TCP 4568) suffers a SQL‑injection flaw that lets an authenticated attacker inject malicious queries and elevate privileges to administrative levels.

Exploitability – The vulnerability requires valid credentials but can be triggered remotely over the network; a proof‑of‑concept exists and the vendor has released a patch. CVSS v3.1 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Affected Products – All DriveLock installations (any version prior to the April 2026 security update).

TPRM Impact – As a widely deployed endpoint‑encryption solution, compromised DriveLock instances can expose encrypted data, undermine client‑side security controls, and propagate risk to downstream partners that rely on its protection.

Recommended Actions

  • Deploy the DriveLock security update immediately (see vendor bulletin).
  • Enforce multi‑factor authentication for all DriveLock admin accounts.
  • Conduct a privileged‑access review to detect any anomalous privilege changes.
  • Update network segmentation to restrict access to port 4568 to trusted hosts only.
  • Verify logs for suspicious SQL‑injection attempts and remediate any discovered abuse.

Source: Zero Day Initiative Advisory ZDI‑26‑286

📰 Original Source
http://www.zerodayinitiative.com/advisories/ZDI-26-286/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.