Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Elastic Refutes Claims of Zero-Day in EDR Product

Posted on August 20, 2025August 20, 2025 By CWS

Elastic on Monday refuted claims that its Defend EDR product is affected by a “zero-day vulnerability”.

The corporate’s response was triggered by an August 16 weblog put up from Ashes Cybersecurity, which claims {that a} signed Elastic kernel driver mishandles reminiscence operations beneath sure situations, inflicting a system crash that might be repeatedly triggered.

“The flaw happens in a code path the place a user-mode controllable pointer is handed right into a kernel operate with out correct validation,” Ashes says, explaining that the problem results in a null pointer dereference.

“This susceptible code path might be exercised throughout regular system exercise, reminiscent of particular compilation or course of injection makes an attempt. When the driving force mishandles the reminiscence pointer, it may be compelled right into a kernel-level crash,” Ashes says.

In a technical writeup, the corporate explains that Elastic’s EDR might be bypassed utilizing its customized C-based loader to execute arbitrary code on the system.

This is able to permit an attacker to plant a customized kernel driver that might work together with Elastic’s kernel driver and set off the flaw to show the legit driver right into a malicious instrument.

“For proof-of-concept demonstration, I used a customized driver to reliably set off the flaw beneath managed situations. This reveals that the vulnerability doesn’t depend on conventional malware, the Elastic driver itself reveals the malicious habits as soon as the defective code path is reached,” Ashes notes.

Responding to Ashes’ put up, Elastic mentioned its investigation into the claims discovered no proof {that a} vulnerability in Defend EDR may result in detection bypass and distant code execution (RCE).Commercial. Scroll to proceed studying.

“Whereas the researcher claims to have the ability to set off a crash/BSOD within the Elastic Endpoint driver from an unprivileged course of, the one demonstration they’ve offered does so from one other kernel driver,” Elastic notes.

Elastic mentioned the researcher submitted a number of experiences concerning the potential bypass and RCE, however that these experiences contained no proof or reproducible exploits. It added that the researcher refused to offer a proof-of-concept (PoC) exploit that its safety crew may reproduce.

“By not sharing full particulars and publicly posting, the conduct of this safety researcher is opposite to the rules of coordinated disclosure,” Elastic says.

In response to Elastic’s rejection, Ashes up to date its put up with alleged proof of user-mode crash, which Elastic was fast to refute as effectively.

“Elastic has reviewed extra proof shared in a weblog put up on August nineteenth. Our prior evaluation stands. For customers of Elastic Defend, no motion is required,” the corporate mentioned.

Associated: SonicWall Says Current Assaults Don’t Contain Zero-Day Vulnerability

Associated: O2 Service Vulnerability Uncovered Consumer Location

Associated: Physician Net Refutes Hackers’ Claims of Consumer Knowledge Theft

Associated: Amnesty Worldwide Canada Says It Was Hacked by Beijing

Security Week News Tags:Claims, EDR, Elastic, Product, Refutes, ZeroDay

Post navigation

Previous Post: Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
Next Post: Okta Security Releases Auth0 Event Logs for Proactive Threat Detection

Related Posts

Trial Opens Against Meta CEO Mark Zuckerberg and Other Leaders Over Facebook Privacy Violations Security Week News
How Scammers Are Using AI to Steal College Financial Aid Security Week News
FBI Warns of Deepfake Messages Impersonating Senior Officials Security Week News
Adobe Patches Critical Code Execution Bugs Security Week News
Microsoft Offers Free Windows 10 Extended Security Update Options as EOS Nears Security Week News
Fable Security Raises $31 Million for Human Risk Management Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News