{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T17:25:43.688","vulnerabilities":[{"cve":{"id":"CVE-2025-14963","sourceIdentifier":"trellixpsirt@trellix.com","published":"2026-02-24T18:29:32.613","lastModified":"2026-02-26T18:39:44.850","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability identified in the HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys is a driver file associated with the HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running a fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the Agent’s processes."},{"lang":"es","value":"Una vulnerabilidad identificada en el archivo de controlador fekern.sys del Agente Trellix HX permitió a un actor de amenaza con acceso de usuario local la capacidad de obtener privilegios de sistema elevados. La utilización de un controlador vulnerable propio (BYOVD) fue aprovechada para obtener acceso a la memoria del proceso crítico de Windows lsass.exe (Servicio de Subsistema de Autoridad de Seguridad Local). El fekern.sys; un archivo de controlador asociado con el Agente Trellix HX (utilizado en todas las versiones existentes del Agente HX). El controlador vulnerable instalado en un producto o un sistema que ejecuta el Agente HX completamente funcional no es, en sí mismo, explotable ya que la protección contra manipulaciones del producto restringe la capacidad de comunicarse con el controlador solo a los procesos del agente."}],"metrics":{"cvssMetricV40":[{"source":"trellixpsirt@trellix.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":6.2,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"trellixpsirt@trellix.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trellix:endpoint_security:*:*:*:*:*:*:*:*","versionStartIncluding":"30.0.0","versionEndIncluding":"34.0.0","matchCriteriaId":"52DECB52-A903-466A-8F0A-89544E1AF8C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:trellix:endpoint_security:35.31.0-37:*:*:*:*:*:*:*","matchCriteriaId":"DB7C7EB0-B5E5-42D4-97E3-71F0A1E0D2B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:trellix:endpoint_security:36.30.0-17:*:*:*:*:*:*:*","matchCriteriaId":"E6EE0927-FA12-481E-9F4C-491091576A03"}]}]}],"references":[{"url":"https://thrive.trellix.com/s/article/000015100","source":"trellixpsirt@trellix.com","tags":["Permissions Required"]}]}}]}