CVE-2025-14963

A vulnerability identified in the HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys is a driver file associated with the HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running a fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the Agent’s processes.
References
Link Resource
https://thrive.trellix.com/s/article/000015100 Permissions Required
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trellix:endpoint_security:*:*:*:*:*:*:*:*
cpe:2.3:a:trellix:endpoint_security:35.31.0-37:*:*:*:*:*:*:*
cpe:2.3:a:trellix:endpoint_security:36.30.0-17:*:*:*:*:*:*:*

History

26 Feb 2026, 18:39

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Trellix
Trellix endpoint Security
CWE NVD-CWE-noinfo
References () https://thrive.trellix.com/s/article/000015100 - () https://thrive.trellix.com/s/article/000015100 - Permissions Required
CPE cpe:2.3:a:trellix:endpoint_security:36.30.0-17:*:*:*:*:*:*:*
cpe:2.3:a:trellix:endpoint_security:35.31.0-37:*:*:*:*:*:*:*
cpe:2.3:a:trellix:endpoint_security:*:*:*:*:*:*:*:*

26 Feb 2026, 08:16

Type Values Removed Values Added
Summary (en) A vulnerability identified in the Trellix HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys; a driver file associated with Trellix HX Agent (used in all existing HX Agent versions).   The vulnerable driver installed in a product or a system running fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the agent’s processes. (en) A vulnerability identified in the HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys is a driver file associated with the HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running a fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the Agent’s processes.

24 Feb 2026, 18:29

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-24 18:29

Updated : 2026-02-26 18:39


NVD link : CVE-2025-14963

Mitre link : CVE-2025-14963

CVE.ORG link : CVE-2025-14963


JSON object : View

Products Affected

trellix

  • endpoint_security
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo