Categories: Cyber Security News

New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD

A newly discovered zero-day vulnerability in Elastic’s Endpoint Detection and Response (EDR) solution allows attackers to bypass security measures, execute malicious code, and trigger a BSOD system crash, according to the Ashes Cybersecurity research.

The vulnerability resides in a core component of the security software, effectively turning the defensive tool into a weapon against the systems it is meant to protect.

The critical flaw was found in the “elastic-endpoint-driver.sys,” a kernel driver signed by Microsoft and developed by Elasticsearch, Inc. This driver is a fundamental part of the Elastic Defend and Elastic Agent security solutions.

The researcher who discovered the vulnerability has detailed a four-step attack chain that exploits this flaw to achieve a complete system compromise.

The attack begins with an EDR Bypass, where an attacker can use a custom loader to circumvent Elastic’s security protections. Once the EDR is blinded, the attacker can proceed to Remote Code Execution (RCE), running malicious code on the system without being detected or blocked.

The third step involves establishing Persistence by planting a custom kernel driver that can interact with the vulnerable Elastic driver. Finally, the attacker can trigger a Privileged Persistent Denial of Service, causing the system to crash repeatedly and rendering it unusable.

Elastic EDR 0-Day Vulnerability

At the heart of the vulnerability is a CWE-476: NULL Pointer Dereference. According to the Ashes Cybersecurity research, the “elastic-endpoint-driver.sys” driver improperly handles memory operations within its privileged kernel routines.

Under certain conditions, a pointer controllable from user-mode is passed into a kernel function without proper validation. If this pointer is null, has been freed, or is corrupted, the kernel attempts to dereference it, leading to a system-wide crash, commonly known as the Blue Screen of Death (BSOD).

The researcher demonstrated that this vulnerability is not just a theoretical bug but a reliable and reproducible exploit. A custom-built Proof of Concept, consisting of a C-based loader and a custom driver, was used to trigger the flaw under controlled conditions.

This proof-of-concept first bypasses the EDR, loads the custom driver, establishes persistence so the driver reloads on reboot, and then interacts with the vulnerable Elastic driver to cause the BSOD.

This effectively proves that the Elastic driver itself can be manipulated to exhibit malware-like behavior.

The implications of this zero-day are severe for enterprises relying on Elastic’s security products. Every organization using Elastic’s SIEM and EDR solutions could potentially be harboring a vulnerability that can be remotely exploited to disable their endpoints at scale.

This situation creates a significant risk, as a trusted, signed kernel driver can be turned into a persistent, privileged weapon.

The discovery timeline for this vulnerability began on June 2nd, 2025. Disclosure attempts were made through HackerOne on June 11th and the Zero Day Initiative (ZDI) on July 29th. Following these attempts, an independent disclosure was made on August 16th, 2025.

The affected product is elastic-endpoint-driver.sys in version 8.17.6, though all subsequent versions are believed to be vulnerable, as no patch has been released.

The researcher noted that the vulnerability was discovered during user-mode testing operations and that their organization, Ashes Cybersecurity Pvt Ltd., is a paying customer of Elastic. “A defender that crashes, blinds or disables its own system on command is indistinguishable from malware,” the researcher stated, highlighting the erosion of trust this causes not only in Elastic but in the broader security industry. Until a patch is issued, customers remain exposed to this active zero-day threat.

Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

The post New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

UK Politicians Say GTA 6 Developer Rockstar ‘Refused to Properly Engage’ With Appeal Processes After Firing Staff Last Year

UK politicians have strongly criticized GTA 6 developer Rockstar for its firing of 34 workers…

58 minutes ago

The LEGO Star Wars AT-AT Walker Has Hit Its Lowest Price So Far at Amazon

May is quite a big month for LEGO fans. Not only are there a wide…

59 minutes ago

Christopher Nolan Defends The Odyssey From Historical Accuracy Complaints After Some Said Agamemnon Looks Like Batman

Christopher Nolan has defended his upcoming movie, The Odyssey, from complaints about historical accuracy, after…

59 minutes ago

Today’s Top Deals: Metroid Prime 4, LEGO Diagon Alley, Hyrule Warriors: Age of Imprisonment

If you’re looking for recently released games to play on Switch, both Metroid Prime 4:…

60 minutes ago

Marvel’s Midnight Line Reinvents the X-Men, Spider-Man, and Fantastic Four via Horror

Marvel fans are still puzzling over the decision to wrap up the wildly successful Ultimate…

2 hours ago

New Pokémon Deluxe Character Guide Book and Limited Edition Box Set Releasing This August

Pokémon fans, it's time to clear out some space on your bookshelf, as the shiny…

2 hours ago

This website uses cookies.