A local, non-privileged attacker can abuse a vulnerable...
High severity
Unreviewed
Published
Mar 16, 2026
to the GitHub Advisory Database
•
Updated Mar 16, 2026
Description
Published by the National Vulnerability Database
Mar 16, 2026
Published to the GitHub Advisory Database
Mar 16, 2026
Last updated
Mar 16, 2026
A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed by the OpenEDR 2.5.1.0 kernel driver to modify the DLL injection path used by the product. By redirecting this path to a user-writable location, an attacker can cause OpenEDR to load an attacker-controlled DLL into high-privilege processes. This results in arbitrary code execution with SYSTEM privileges, leading to full compromise of the affected system.
References