EDR-Freeze Technique Exposes Security Vulnerabilities

22 Sep 2025

A recent proof-of-concept named EDR-Freeze has emerged, showcasing a technique that permits attackers to bypass endpoint detection and response (EDR) systems, as well as antivirus solutions, by exploiting the Microsoft Windows Error Reporting (WER) system. Developed by researchers aiming to expose potential vulnerabilities, EDR-Freeze operates in user mode and eliminates the need for flawed kernel drivers. This novel approach places security agents into a state of hibernation, effectively making them inactive.

Exploring the Mechanics of EDR-Freeze

EDR-Freeze leverages WerFaultSecure, a component of WER functioning as a Protected Process Light, alongside the MiniDumpWriteDump API. This API is traditionally used to generate crash dumps by pausing a target process's threads to create a minidump. This process is typically routine, but EDR-Freeze manipulates it to suspend the EDR process itself, ensuring it remains indefinitely frozen.

The method of attack operates through a carefully coordinated race condition, executed via four distinct steps. The sequence begins with spawning WerFaultSecure as a PPL. Next, it is instructed to activate the MiniDumpWriteDump on the target Process ID (PID). Following this, the attacker waits for the target process to be suspended before executing the final step, which involves suspending the WerFaultSecure dumper itself using NtSuspendProcess. As a result, the target process is left in a suspended state that persists indefinitely.

Implications and Potential Countermeasures

During testing on Windows 11 24H2, this method was shown to successfully freeze critical processes such as the Windows Defender, culminating in a significant security concern due to its effectiveness. The underlying issue stems from the design interaction between MiniDumpWriteDump and WerFaultSecure, recognized more as a design flaw rather than a direct vulnerability.

To counteract these weaknesses, several defenses have been proposed. These include vigilant monitoring of WER invocations, particularly those related to sensitive PIDs like LSASS or other security tools. Additionally, mapping activity related to WerFaultSecure to Microsoft Defender Endpoint processes is advised. Collaboration with Microsoft could lead to hardening WER components, restricting suspicious usage patterns, or imposing limitations on allowed parameters.

While the implications are still unfolding, the EDR-Freeze technique has prompted significant conversations about the robustness of endpoint protection measures. As researchers like Zero Salarium contribute to unveiling these issues, it remains crucial for security teams and technology providers to address these inherent vulnerabilities proactively.

Top charts for Desktop Windows

uTorrent

uTorrent

Latest update uTorrent download for free for Windows PC or Android mobile

5
1032 reviews
7508630
downloads
Zona

Zona

Latest update Zona download for free for Windows PC or Android mobile

4
614 reviews
1735702
downloads
WinRAR

WinRAR

Streamline file management with fast compression, secure your documents, and save space.

5
735 reviews
746792
downloads
Minecraft

Minecraft

Shape environments, explore vast worlds, and survive against monsters with endless creativity.

5
750 reviews
497296
downloads

Comments (0)

No comments yet. Be the first to comment!