A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed by the OpenEDR 2.5.1.0 kernel driver to modify the DLL injection path used by the product. By redirecting this path to a user-writable location, an attacker can cause OpenEDR to load an attacker-controlled DLL into high-privilege processes. This results in arbitrary code execution with SYSTEM privileges, leading to full compromise of the affected system.
References
| Link | Resource |
|---|---|
| https://gist.github.com/ikerl/c3ec81f12ded44c2e0ae2dfdacb562ba | Exploit |
| https://github.com/ComodoSecurity/openedr | Product |
| https://github.com/ComodoSecurity/openedr/issues/49 | Issue Tracking Third Party Advisory |
| https://scavengersecurity.com/posts/edr-as-rootkit-2/ | Exploit Third Party Advisory |
| https://www.openedr.com/ | Product |
Configurations
History
20 Mar 2026, 13:51
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:xcitium:openedr:2.5.1.0:*:*:*:*:*:*:* | |
| First Time |
Xcitium
Xcitium openedr |
|
| References | () https://gist.github.com/ikerl/c3ec81f12ded44c2e0ae2dfdacb562ba - Exploit | |
| References | () https://github.com/ComodoSecurity/openedr - Product | |
| References | () https://github.com/ComodoSecurity/openedr/issues/49 - Issue Tracking, Third Party Advisory | |
| References | () https://scavengersecurity.com/posts/edr-as-rootkit-2/ - Exploit, Third Party Advisory | |
| References | () https://www.openedr.com/ - Product | |
| Summary |
|
16 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CWE | CWE-427 |
16 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-16 16:16
Updated : 2026-03-20 13:51
NVD link : CVE-2025-69784
Mitre link : CVE-2025-69784
CVE.ORG link : CVE-2025-69784
JSON object : View
Products Affected
xcitium
- openedr
CWE
CWE-427
Uncontrolled Search Path Element
