A critical vulnerability has been discovered in the FireEye Endpoint Detection and Response (EDR) agent, tracked as CVE-2025-0618. This flaw allows attackers to inject malicious code and disable key security features, weakening overall endpoint protection. The vulnerability specifically targets the tamper protection mechanisms designed to alert defenders to attacks. By exploiting this flaw, attackers can turn off security alarms, rendering systems vulnerable to further exploitation.
The vulnerability occurs when a specially crafted tamper protection event is sent to the HX service. This event triggers an exception in the processing logic, causing the system to stop handling future tamper protection events. The persistent denial of service effect persists even after a reboot, leaving the system unprotected from subsequent attacks. This makes the flaw particularly concerning, as it leaves endpoints exposed to further threats without detection.
Security experts emphasize the danger posed by this flaw, as it directly impacts the core protection system.
With tamper protection disabled, attackers can disable real-time threat detection and security features that would normally alert security teams. The issue is compounded by the fact that once the vulnerability is triggered, unprocessed events may result in data loss, allowing attackers to continue their activities undetected.
Trellix, which now oversees the FireEye product line, has acknowledged the vulnerability and is actively working on a patch. Users of the affected FireEye EDR HX version 10.0.0 are strongly urged to update to the latest version once a fix is available. This incident highlights the persistent challenges of securing endpoint protection systems against sophisticated threats.