CVE-2025-14963

A vulnerability identified in the HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys is a driver file associated with the HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running a fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the Agent’s processes.
References
Link Resource
https://thrive.trellix.com/s/article/000015100 Permissions Required
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trellix:endpoint_security:*:*:*:*:*:*:*:*
cpe:2.3:a:trellix:endpoint_security:35.31.0-37:*:*:*:*:*:*:*
cpe:2.3:a:trellix:endpoint_security:36.30.0-17:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-24 18:29

Updated : 2026-02-26 18:39


NVD link : CVE-2025-14963

Mitre link : CVE-2025-14963

CVE.ORG link : CVE-2025-14963


JSON object : View

Products Affected

trellix

  • endpoint_security
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo