๐Ÿ” CVE Alert

CVE-2025-68947

MEDIUM 4.7

NSecsoft NSecKrnl process termination privilege escalation

CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th

NSecsoft 'NSecKrnl' is a Windows driver that allows a local, authenticated attacker to terminate processes owned by other users, including SYSTEM and Protected Processes by issuing crafted IOCTL requests to the driver.

CWE CWE-862
Vendor nsecsoft
Product nseckrnl
Published Jan 13, 2026
Last Updated Mar 10, 2026
Stay Ahead of the Next One

Get instant alerts for nsecsoft nseckrnl

Be the first to know when new medium vulnerabilities affecting nsecsoft nseckrnl are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

NSecsoft / NSecKrnl
0 < *

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
virustotal.com: https://www.virustotal.com/gui/file/206f27ae820783b7755bca89f83a0fe096dbb510018dd65b63fc80bd20c03261 hexastrike.com: https://hexastrike.com/resources/blog/threat-intelligence/valleyrat-exploiting-byovd-to-kill-endpoint-security/ github.com: https://github.com/ANYLNK/NSecSoftBYOVD cve.org: https://www.cve.org/CVERecord?id=CVE-2025-68947 raw.githubusercontent.com: https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2026/va-26-013-01.json

Credits

Maurice Fielenbach, Hexastrike Cybersecurity