Microsoft Windows Vulnerable to BYOVD Attacks for Three Years: Report

Microsoft has reportedly failed to address deficiencies in Windows security that could allow attackers to carry out bring-your-own-vulnerable-driver (BYOVD) attacks.

October 18, 2022

Microsoft has reportedly failed to address deficiencies in Windows security that could allow attackers to compromise machines through bring-your-own-vulnerable-driver (BYOVD) attacks. New research indicates that Redmond has not updated its list of drivers that are blacklisted from being downloaded and installed onto devices since 2019.

According to a new report by ArsTechnica’s Dan Goodin, hypervisor-protected code integrity (HVCI), a tool that, according to Microsoft, protects the Windows kernel, is woefully inadequate. Microsoft said HVCI protects against the onslaught of BYOVD attacks arising from security vulnerability exploitation.

The ArsTechnica report is corroborated by research from ANALGENCE senior vulnerability analyst Will Dormann who, in a Twitter thread, concluded that a March 2020 Microsoft blog titled ‘Secured-code PCs: A brief showcase of chip-to-cloud security against kernel attacks’ is “promoting a feature that doesn’t exist.”

Both Dormann and ArsTechnicaOpens a new window said they could download and install a malicious driver on a device where HVCI was enabled. Moreover, the malicious driver in question was listed as one of the drivers in Microsoft’s blocklist.

Drivers are some pieces of software interfacing between different software/hardware components manufactured by several vendors. Drivers basically enable users to establish communication between various programs/devices they use, such as keyboards, printers, etc.

The authenticity of drivers, usually verified using a digital signature, is an essential part of protecting the device and the user considering it needs access to the kernel, the code at the core of any operating system.

See More: Cybersecurity Awareness Month: Eight Security Insights That You Should Know

An unauthenticated driver vulnerable to exploitation can enable threat actors to take over the machine and thus become a threat to the device and the ecosystem within which it operates.

David Weston, Microsoft’s VP of OS Security and Enterprise, in December 2020, responded to researcher Kevin Beaumont, “PSA @surface  book 3 and all new Surface devices have HVCI and VBS on by DEFAULT which enforces a driver block policy that blocks RWET and other bad drivers.  Security vendors are going to tell you need to buy their stuff, but Windows has everything you need to block it.”

More recently, Microsoft’s Jeffrey Sutherland replied to Dormann’s thread dated September 2022. Sutherland tweeted:

Beaumont, who has previously reported issues with the blocklist, said: “It’s baffling on the customer end too as they’ve been touting this to customers for years as The Solution, apparently unaware it wasn’t.. well.. Working.”

Earlier this month, Dormann confirmed that Microsoft updated the documentation that attests to the current state of affairs concerning the driver blocklist. How the Windows maker plans to bridge the gap, which remained undetected for three years, remains to be seen.

Some examples of BYOVD attacks include the BlackByte ransomware gang leveraging vulnerabilities in Micro-Star’s MSI AfterBurner 4.6.2.15658 graphics card and AvosLocker ransomware exploiting a vulnerability in Avast’s anti-rootkit driver.

Let us know if you enjoyed reading this news on LinkedInOpens a new window , TwitterOpens a new window , or FacebookOpens a new window . We would love to hear from you!

Image source: Shutterstock

MORE ON CYBER RISK MANAGEMENT

Sumeet Wadhwani
Sumeet Wadhwani

Asst. Editor, Spiceworks Ziff Davis

An earnest copywriter at heart, Sumeet is what you'd call a jack of all trades, rather techs. A self-proclaimed 'half-engineer', he dropped out of Computer Engineering to answer his creative calling pertaining to all things digital. He now writes what techies engineer. As a technology editor and writer for News and Feature articles on Spiceworks (formerly Toolbox), Sumeet covers a broad range of topics from cybersecurity, cloud, AI, emerging tech innovation, hardware, semiconductors, et al. Sumeet compounds his geopolitical interests with cartophilia and antiquarianism, not to mention the economics of current world affairs. He bleeds Blue for Chelsea and Team India! To share quotes or your inputs for stories, please get in touch on sumeet_wadhwani@swzd.com
Take me to Community
Do you still have questions? Head over to the Spiceworks Community to find answers.