Description
IDrive’s id_service.exe process runs with elevated privileges and regularly reads from several files under the C:\ProgramData\IDrive\ directory. The UTF16-LE encoded contents of these files are used as arguments for starting a process, but they can be edited by any standard user logged into the system. An attacker can overwrite or edit the files to specify a path to an arbitrary executable, which will then be executed by the id_service.exe process with SYSTEM privileges.
Published: 2026-03-24
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows a local user to write arbitrary files into the IDrive Cloud Backup Client’s data directory. The id_service.exe process, which runs with SYSTEM privileges, reads UTF‑16 encoded strings from those files to build command line arguments for launching processes. By editing the files, an attacker can specify the path of any executable, which will then be executed under SYSTEM rights. This results in unchecked code execution with the highest privilege level on the host, compromising confidentiality, integrity, and availability of the system.

Affected Systems

IDrive Cloud Backup Client for Windows (all versions that install id_service.exe and use the ProgramData\IDrive directory). No specific version range was published, so all current releases with the described behavior are considered vulnerable.

Risk and Exploitability

The CVSS score of 7.8 indicates a high impact vulnerability, and the EPSS score of less than 1% suggests a comparatively low probability of exploitation in the wild. The vulnerability is not yet listed in CISA’s Known Exploited Vulnerabilities catalog. Exploitation requires a local user session with write permission to C:\ProgramData\IDrive; the attacker can then place any executable in the monitored files and cause it to run with SYSTEM privileges. The attack vector is inferred to be local, with no disclosed remote code execution path. Overall, the risk is significant because an attacker who can log onto the machine or inject files via an application can achieve full system compromise.

Generated by OpenCVE AI on March 25, 2026 at 15:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest update or patch for IDrive Cloud Backup Client for Windows that removes the privilege escalation path.
  • If a patch is not yet available, restrict file permissions on the C:\ProgramData\IDrive directory to deny write access to standard users, so that only the SYSTEM account can modify the monitored files.
  • Consider disabling or stopping the id_service.exe process if the backup service is not required for the environment.

Generated by OpenCVE AI on March 25, 2026 at 15:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Idrive
Idrive idrive Cloud Backup Client For Windows
Vendors & Products Idrive
Idrive idrive Cloud Backup Client For Windows

Tue, 24 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
References

Tue, 24 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
Description IDrive’s id_service.exe process runs with elevated privileges and regularly reads from several files under the C:\ProgramData\IDrive\ directory. The UTF16-LE encoded contents of these files are used as arguments for starting a process, but they can be edited by any standard user logged into the system. An attacker can overwrite or edit the files to specify a path to an arbitrary executable, which will then be executed by the id_service.exe process with SYSTEM privileges.
Title IDrive Cloud Backup Client for Windows contains a privilege escalation vulnerability
References

Subscriptions

Idrive Idrive Cloud Backup Client For Windows
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-03-25T13:14:39.639Z

Reserved: 2026-02-05T16:44:28.604Z

Link: CVE-2026-1995

cve-icon Vulnrichment

Updated: 2026-03-24T19:24:11.136Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T19:16:49.033

Modified: 2026-03-25T15:41:58.280

Link: CVE-2026-1995

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:49:35Z

Weaknesses

No weakness.