A local attacker can bypass OpenEDR's 2.5.1.0 self-defense mechanism by renaming a malicious executable to match a trusted process name (e.g., csrss.exe, edrsvc.exe, edrcon.exe). This allows unauthorized interaction with the OpenEDR kernel driver, granting access to privileged functionality such as configuration changes, process monitoring, and IOCTL communication that should be restricted to trusted components. While this issue alone does not directly grant SYSTEM privileges, it breaks OpenEDR's trust model and enables further exploitation leading to full local privilege escalation.
References
| Link | Resource |
|---|---|
| https://github.com/ComodoSecurity/openedr | Product |
| https://github.com/ComodoSecurity/openedr/issues/49 | Issue Tracking Third Party Advisory |
| https://scavengersecurity.com/posts/edr-as-rootkit-2/ | Exploit Third Party Advisory |
| https://www.openedr.com/ | Product |
Configurations
History
20 Mar 2026, 13:55
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Xcitium
Xcitium openedr |
|
| CPE | cpe:2.3:a:xcitium:openedr:2.5.1.0:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://github.com/ComodoSecurity/openedr - Product | |
| References | () https://github.com/ComodoSecurity/openedr/issues/49 - Issue Tracking, Third Party Advisory | |
| References | () https://scavengersecurity.com/posts/edr-as-rootkit-2/ - Exploit, Third Party Advisory | |
| References | () https://www.openedr.com/ - Product |
17 Mar 2026, 14:20
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-250 |
16 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-16 16:16
Updated : 2026-03-20 13:55
NVD link : CVE-2025-69783
Mitre link : CVE-2025-69783
CVE.ORG link : CVE-2025-69783
JSON object : View
Products Affected
xcitium
- openedr
CWE
CWE-250
Execution with Unnecessary Privileges
