CVE-2025-68947
NSecsoft NSecKrnl process termination privilege escalation
CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th
NSecsoft 'NSecKrnl' is a Windows driver that allows a local, authenticated attacker to terminate processes owned by other users, including SYSTEM and Protected Processes by issuing crafted IOCTL requests to the driver.
| CWE | CWE-862 |
| Vendor | nsecsoft |
| Product | nseckrnl |
| Published | Jan 13, 2026 |
| Last Updated | Mar 10, 2026 |
Stay Ahead of the Next One
Get instant alerts for nsecsoft nseckrnl
Be the first to know when new medium vulnerabilities affecting nsecsoft nseckrnl are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Affected Versions
NSecsoft / NSecKrnl
0 < *
References
virustotal.com: https://www.virustotal.com/gui/file/206f27ae820783b7755bca89f83a0fe096dbb510018dd65b63fc80bd20c03261 hexastrike.com: https://hexastrike.com/resources/blog/threat-intelligence/valleyrat-exploiting-byovd-to-kill-endpoint-security/ github.com: https://github.com/ANYLNK/NSecSoftBYOVD cve.org: https://www.cve.org/CVERecord?id=CVE-2025-68947 raw.githubusercontent.com: https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2026/va-26-013-01.json
Credits
Maurice Fielenbach, Hexastrike Cybersecurity