Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Local Vulnerable IOCTL Enables DLL Injection for SYSTEM Privilege Escalation |
Fri, 20 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xcitium
Xcitium openedr |
|
| CPEs | cpe:2.3:a:xcitium:openedr:2.5.1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Xcitium
Xcitium openedr |
Tue, 17 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Comodosecurity
Comodosecurity openedr |
|
| Vendors & Products |
Comodosecurity
Comodosecurity openedr |
Mon, 16 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-427 | |
| Metrics |
cvssV3_1
|
Mon, 16 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed by the OpenEDR 2.5.1.0 kernel driver to modify the DLL injection path used by the product. By redirecting this path to a user-writable location, an attacker can cause OpenEDR to load an attacker-controlled DLL into high-privilege processes. This results in arbitrary code execution with SYSTEM privileges, leading to full compromise of the affected system. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-16T18:52:07.059Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-69784
Updated: 2026-03-16T18:49:49.797Z
Status : Analyzed
Published: 2026-03-16T16:16:13.460
Modified: 2026-03-20T13:51:52.123
Link: CVE-2025-69784
No data.
OpenCVE Enrichment
Updated: 2026-03-23T14:00:53Z