A vulnerability identified in the HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys is a driver file associated with the HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running a fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the Agent’s processes.
History

Thu, 26 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Trellix endpoint Security
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:trellix:endpoint_security:*:*:*:*:*:*:*:*
cpe:2.3:a:trellix:endpoint_security:35.31.0-37:*:*:*:*:*:*:*
cpe:2.3:a:trellix:endpoint_security:36.30.0-17:*:*:*:*:*:*:*
Vendors & Products Trellix endpoint Security
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 26 Feb 2026 07:45:00 +0000

Type Values Removed Values Added
Description A vulnerability identified in the Trellix HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys; a driver file associated with Trellix HX Agent (used in all existing HX Agent versions).   The vulnerable driver installed in a product or a system running fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the agent’s processes. A vulnerability identified in the HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys is a driver file associated with the HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running a fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the Agent’s processes.

Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Trellix
Trellix endpoint Hx Agent (xagent)
Vendors & Products Trellix
Trellix endpoint Hx Agent (xagent)

Tue, 24 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
Description A vulnerability identified in the Trellix HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys; a driver file associated with Trellix HX Agent (used in all existing HX Agent versions).   The vulnerable driver installed in a product or a system running fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the agent’s processes.
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 6.2, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published: 2026-02-24T17:11:06.812Z

Updated: 2026-02-26T14:44:08.034Z

Reserved: 2025-12-19T10:32:38.416Z

Link: CVE-2025-14963

cve-icon Vulnrichment

Updated: 2026-02-25T15:55:01.656Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T18:29:32.613

Modified: 2026-02-26T18:39:44.850

Link: CVE-2025-14963

cve-icon Redhat

No data.