Windows' safety mechanism failed in protecting millions of users against malicious drivers: Report

By Digit NewsDesk | Published 17 Oct 2022 20:46 IST
  • Microsoft seems to have ignored a critical security aspect for Windows devices.

  • Windows Update reportedly allows vulnerable drivers to be installed on systems.

  • Researchers have collectively pointed out that mechanisms in place are not working as intended.

Windows' safety mechanism failed in protecting millions of users against malicious drivers: Report
Windows' safety mechanism failed in protecting millions of users against malicious drivers: Report

Microsoft has reportedly failed at protecting Windows against malicious drivers. Although the company has advertised that its Windows Update mechanism blocks vulnerable drivers, a publication has proved otherwise, pointing out that the list of affected drivers was not updated in time. This, in turn, left millions of customers unguarded against a malware infection technique that has been active recently called BYOVD, which stands for “brings your own vulnerable driver.” Let’s understand what happened in detail. 

Hackers are exploiting malfunctioning computer drivers to get access to systems

Windows update

Typically, drivers are tools that help a computer function with peripheral devices such as printers, cameras, and graphics cards, among others. They act as a bridge between the core of the operating system and the device to get a specific task done. In the process, drivers often require access to the kernel, the most sensitive part of an operating system. 

To avoid kernel from unauthorised access, Microsoft does not allow drivers from untrusted sources to access it. However, hackers and bad actors are now using “legitimate drivers” that contain memory corruption vulnerabilities to get past the security barriers set by Microsoft. Such drivers have allowed cybercriminals to access the kernel and take control of users’ devices, and this technique of using official-but-compromised drivers is called BYOVD. The method has been in use since 2012. 

Microsoft should have updated the list of blocked drivers three years ago

The report by ArsTechnica mentions that “Microsoft is acutely aware of the BYOVD threat and has been working on defenses to stop these attacks, mainly by creating mechanisms to stop Windows from loading signed-but-vulnerable drivers.” However, the report also mentions that Microsoft’s approach did not work well. Microsoft Windows Update has failed to update the list of compromised or affected drivers, opening a chance for bad actors to misuse them. 

Dan Goodin of ArsTechnica and Peter Kalnai, a researcher at ESET, found out that the feature that blocked affected drivers on Microsoft Windows on a PC did not stop a Windows 10 Enterprise system from loading a vulnerable Dell driver. 

Senior vulnerability analyst at ANALYGENCE, Will Dormann, discovered that the ASR system Microsoft talks about does not work. The analyst has also concluded that the “driver blocklist for HVCI-enabled Windows 10 machines hadn’t been updated since 2019, and the initial blocklist for Server 2019 only included two drivers.”

In response, a Microsoft manager took to Twitter to say that the company had updated the online documents and added a download containing instructions to deploy the blocklist updates manually. However, it is important to note that this is not the ultimate solution. Microsoft should roll out the blocklist updates via the Windows Update mechanism to protect all users against the threat. 

For more technology newsproduct reviews, sci-tech features and updates, keep reading

For more technology news, product reviews, sci-tech features and updates, keep reading or head to our Google News page.

Digit NewsDesk
Digit NewsDesk

Email Email Digit NewsDesk

Follow Us Facebook Logo Facebook Logo Facebook Logo

About Me: Digit News Desk writes news stories across a range of topics. Getting you news updates on the latest in the world of tech. Read More