Advisory

Researchers report zero-day vulnerability in Elastic Endpoint Detection and Respons Driver that enables system compromise

Take action: We don't have a great advice for this one. It's an unpatched flaw in Elastic EDR. If you are using that tool, reach out to the vendor for more information.


Learn More

Cybersecurity researchers at Ashes Cybersecurity are reporting a zero-day vulnerability in Elastic's Endpoint Detection and Response (EDR) software.

The vulnerability, (no CVE, no CVSS score), affects the Microsoft-signed kernel driver "elastic-endpoint-driver.sys". It was on June 2, 2025, during legitimate user-mode testing operations conducted by Ashes Cybersecurity Pvt Ltd. The company is a paying customer of Elasticsearch EDR. 

The flaw is classified as a CWE-476: NULL Pointer Dereference vulnerability. Under specific conditions, the driver mishandles memory operations inside privileged kernel routines, causing a system crash that can be reliably and repeatedly triggered.

The exploit can enable attackers to bypass Elastic's security solutions (Elastic Agent + Elastic Defend), gain remote code execution capabilities, establish persistence by planting a custom kernel driver that interacts with the vulnerable Elastic component and cause denial of service attacks.

Affected version is 8.17.6 (tested version). The researchers claim that all subsequent versions are currently affected since no patch is available.

There is no comment or acknowledgement of the issue from Elastic even after multiple attempts to report the flaw to the company.

Researchers report zero-day vulnerability in Elastic Endpoint Detection and Respons Driver that enables system compromise