A vulnerability identified in the HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys is a driver file associated with the HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running a fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the Agent’s processes.
References
| Link | Resource |
|---|---|
| https://thrive.trellix.com/s/article/000015100 | Permissions Required |
Configurations
Configuration 1 (hide)
|
History
26 Feb 2026, 18:39
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Trellix
Trellix endpoint Security |
|
| CWE | NVD-CWE-noinfo | |
| References | () https://thrive.trellix.com/s/article/000015100 - Permissions Required | |
| CPE | cpe:2.3:a:trellix:endpoint_security:36.30.0-17:*:*:*:*:*:*:* cpe:2.3:a:trellix:endpoint_security:35.31.0-37:*:*:*:*:*:*:* cpe:2.3:a:trellix:endpoint_security:*:*:*:*:*:*:*:* |
26 Feb 2026, 08:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) A vulnerability identified in the HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys is a driver file associated with the HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running a fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the Agent’s processes. |
24 Feb 2026, 18:29
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-24 18:29
Updated : 2026-02-26 18:39
NVD link : CVE-2025-14963
Mitre link : CVE-2025-14963
CVE.ORG link : CVE-2025-14963
JSON object : View
Products Affected
trellix
- endpoint_security
CWE
