A vulnerability identified in the HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys is a driver file associated with the HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running a fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the Agent’s processes.
References
| Link | Resource |
|---|---|
| https://thrive.trellix.com/s/article/000015100 | Permissions Required |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-24 18:29
Updated : 2026-02-26 18:39
NVD link : CVE-2025-14963
Mitre link : CVE-2025-14963
CVE.ORG link : CVE-2025-14963
JSON object : View
Products Affected
trellix
- endpoint_security
CWE
