Skip to content

[Security bug] LPE - OpenEDR <= v2.5.1.0 #49

@ikerl

Description

@ikerl

Two critical vulnerabilities have been identified in OpenEDR that allow for local privilege escalation. These flaws, when combined, enable any non-privileged user to escalate their privileges to local administrator on a system where OpenEDR is installed. A functional exploit has been developed that takes advantage of these vulnerabilities, demonstrating how attackers can bypass OpenEDR’s security mechanisms to gain elevated access. Below are the details of each vulnerability:

  • Bypassing Self-Defense by Renaming the Executable

The self-defense mechanism in OpenEDR can be easily bypassed by renaming a malicious executable to match one of the trusted process names, such as csrss.exe, edrsvc.exe, or edrcon.exe. This allows an attacker to interact with the OpenEDR driver’s privileged functionalities, including configuration modifications and process monitoring, without triggering any security measures.

An attacker can execute a malicious process with elevated privileges simply by renaming their executable to one of the trusted names, effectively bypassing the self-defense mechanism and gaining access to sensitive EDR features.

  • Privilege Escalation via Malicious DLL Injection Path Modification

The vulnerability allows privilege escalation by modifying the injected DLL path used by OpenEDR to inject monitoring DLLs into processes. By crafting a custom IOCTL request, an attacker can redirect the DLL path to a location writable by non-privileged users. With this, they can inject a malicious DLL into high-privilege processes, resulting in privilege escalation.

An attacker can modify the DLL path to point to a location they control (e.g., c:\windows\system3../../st/st.dll -> c:\st\st.dll), allowing their malicious DLL to be injected into privileged processes (e.g., Windows Defender), leading to privilege escalation and potential system compromise.

Details
More details: https://scavengersecurity.com/posts/edr-as-rootkit-2/

Affected versions
All versions of OpenEDR as of December 13, 2025 are affected by these vulnerabilities.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions