{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T05:48:17.983","vulnerabilities":[{"cve":{"id":"CVE-2025-0618","sourceIdentifier":"trellixpsirt@trellix.com","published":"2025-04-23T07:15:42.687","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A malicious third party could invoke a persistent denial of service vulnerability in FireEye EDR agent by sending a specially-crafted tamper protection event to the HX service to trigger an exception. This exception will prevent any further tamper protection events from being processed, even after a reboot of HX."},{"lang":"es","value":"Un tercero malintencionado podría invocar una vulnerabilidad de denegación de servicio persistente en FireEye EDR agent enviando un evento de protección contra manipulaciones especialmente manipulado al servicio HX para activar una excepción. Esta excepción impedirá que se procesen más eventos de protección contra manipulaciones, incluso después de reiniciar HX."}],"metrics":{"cvssMetricV31":[{"source":"trellixpsirt@trellix.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"trellixpsirt@trellix.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]}],"references":[{"url":"https://thrive.trellix.com/s/article/000014456","source":"trellixpsirt@trellix.com"}]}}]}