Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://thrive.trellix.com/s/article/000015100 |
|
Thu, 26 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trellix endpoint Security
|
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:trellix:endpoint_security:*:*:*:*:*:*:*:* cpe:2.3:a:trellix:endpoint_security:35.31.0-37:*:*:*:*:*:*:* cpe:2.3:a:trellix:endpoint_security:36.30.0-17:*:*:*:*:*:*:* |
|
| Vendors & Products |
Trellix endpoint Security
|
|
| Metrics |
cvssV3_1
|
Thu, 26 Feb 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability identified in the Trellix HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys; a driver file associated with Trellix HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the agent’s processes. | A vulnerability identified in the HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys is a driver file associated with the HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running a fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the Agent’s processes. |
Wed, 25 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trellix
Trellix endpoint Hx Agent (xagent) |
|
| Vendors & Products |
Trellix
Trellix endpoint Hx Agent (xagent) |
Tue, 24 Feb 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability identified in the Trellix HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys; a driver file associated with Trellix HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the agent’s processes. | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: trellix
Published:
Updated: 2026-02-26T14:44:08.034Z
Reserved: 2025-12-19T10:32:38.416Z
Link: CVE-2025-14963
Updated: 2026-02-25T15:55:01.656Z
Status : Analyzed
Published: 2026-02-24T18:29:32.613
Modified: 2026-02-26T18:39:44.850
Link: CVE-2025-14963
No data.
OpenCVE Enrichment
Updated: 2026-02-25T11:38:35Z