A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine.
To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program.
The update addresses the vulnerability by correcting how Windows validates User Mode Code Integrity policies.
Exploitability Assessment
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
Publicly Disclosed |
Exploited |
Latest Software Release |
Older Software Release |
Denial of Service |
No |
No |
1 - Exploitation More Likely |
1 - Exploitation More Likely |
Not Applicable |
Security Updates
To determine the support life cycle for your software version or edition, see the
Microsoft Support Lifecycle.
Mitigations
Microsoft has not identified any
mitigating factors for this vulnerability.
Workarounds
Microsoft has not identified any
workarounds for this vulnerability.
Acknowledgements
Matt Graeber of
SpecterOps
See
acknowledgements for more information.
Disclaimer
The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Revisions