Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Elastic Refutes Claims of Zero-Day in EDR Product

Elastic Refutes Claims of Zero-Day in EDR Product

Posted on August 20, 2025August 20, 2025 By CWS

Elastic on Monday refuted claims that its Defend EDR product is affected by a “zero-day vulnerability”.

The corporate’s response was triggered by an August 16 weblog put up from Ashes Cybersecurity, which claims {that a} signed Elastic kernel driver mishandles reminiscence operations beneath sure situations, inflicting a system crash that might be repeatedly triggered.

“The flaw happens in a code path the place a user-mode controllable pointer is handed right into a kernel operate with out correct validation,” Ashes says, explaining that the problem results in a null pointer dereference.

“This susceptible code path might be exercised throughout regular system exercise, reminiscent of particular compilation or course of injection makes an attempt. When the driving force mishandles the reminiscence pointer, it may be compelled right into a kernel-level crash,” Ashes says.

In a technical writeup, the corporate explains that Elastic’s EDR might be bypassed utilizing its customized C-based loader to execute arbitrary code on the system.

This is able to permit an attacker to plant a customized kernel driver that might work together with Elastic’s kernel driver and set off the flaw to show the legit driver right into a malicious instrument.

“For proof-of-concept demonstration, I used a customized driver to reliably set off the flaw beneath managed situations. This reveals that the vulnerability doesn’t depend on conventional malware, the Elastic driver itself reveals the malicious habits as soon as the defective code path is reached,” Ashes notes.

Responding to Ashes’ put up, Elastic mentioned its investigation into the claims discovered no proof {that a} vulnerability in Defend EDR may result in detection bypass and distant code execution (RCE).Commercial. Scroll to proceed studying.

“Whereas the researcher claims to have the ability to set off a crash/BSOD within the Elastic Endpoint driver from an unprivileged course of, the one demonstration they’ve offered does so from one other kernel driver,” Elastic notes.

Elastic mentioned the researcher submitted a number of experiences concerning the potential bypass and RCE, however that these experiences contained no proof or reproducible exploits. It added that the researcher refused to offer a proof-of-concept (PoC) exploit that its safety crew may reproduce.

“By not sharing full particulars and publicly posting, the conduct of this safety researcher is opposite to the rules of coordinated disclosure,” Elastic says.

In response to Elastic’s rejection, Ashes up to date its put up with alleged proof of user-mode crash, which Elastic was fast to refute as effectively.

“Elastic has reviewed extra proof shared in a weblog put up on August nineteenth. Our prior evaluation stands. For customers of Elastic Defend, no motion is required,” the corporate mentioned.

Associated: SonicWall Says Current Assaults Don’t Contain Zero-Day Vulnerability

Associated: O2 Service Vulnerability Uncovered Consumer Location

Associated: Physician Net Refutes Hackers’ Claims of Consumer Knowledge Theft

Associated: Amnesty Worldwide Canada Says It Was Hacked by Beijing

Security Week News Tags:Claims, EDR, Elastic, Product, Refutes, ZeroDay

Post navigation

Previous Post: Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
Next Post: Okta Security Releases Auth0 Event Logs for Proactive Threat Detection

Related Posts

OpenSSL Vulnerabilities Allow Private Key Recovery, Code Execution, DoS Attacks OpenSSL Vulnerabilities Allow Private Key Recovery, Code Execution, DoS Attacks Security Week News
Sophisticated ClickFix Campaign Targeting Hospitality Sector Sophisticated ClickFix Campaign Targeting Hospitality Sector Security Week News
Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities Security Week News
US Sanctions Philippine Company for Supporting Crypto Scams US Sanctions Philippine Company for Supporting Crypto Scams Security Week News
Adobe Addresses 44 Vulnerabilities in Software Update Adobe Addresses 44 Vulnerabilities in Software Update Security Week News
Nucleus Secures M for Advanced Exposure Management Nucleus Secures $20M for Advanced Exposure Management Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News