SDF Chatter
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
ylai@lemmy.ml to cybersecurity@infosec.pubEnglish · 1 year ago

Microsoft waited 6 months to patch actively exploited admin-to-kernel vulnerability

www.theregister.com

external-link
message-square
7
fedilink
  • cross-posted to:
  • technology@lemmy.world
62
external-link

Microsoft waited 6 months to patch actively exploited admin-to-kernel vulnerability

www.theregister.com

ylai@lemmy.ml to cybersecurity@infosec.pubEnglish · 1 year ago
message-square
7
fedilink
  • cross-posted to:
  • technology@lemmy.world
Windows admin-to-kernel exploit went unpatched for 6 months
www.theregister.com
external-link
PLUS: NSA shares cloud security tips; Infosec training for Jordanian women; Critical vulnerabilities
alert-triangle
You must log in or register to comment.
  • SpaceNoodle@lemmy.world
    link
    fedilink
    English
    arrow-up
    18
    ·
    1 year ago

    It they’ve already got admin privileges, you’re already fucked.

    • Justin@lemmy.jlh.name
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      1 year ago

      Other OSes like Linux try to maintain this security boundary, though: https://www.man7.org/linux/man-pages/man7/kernel_lockdown.7.html

      • Skull giver@popplesburger.hilciferous.nl
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        edit-2
        1 year ago

        deleted by creator

        • Justin@lemmy.jlh.name
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 year ago

          You might be right. I think that the Linux kernel doesn’t have an ABI though, so I believe the driver has to be built for the current version of the kernel. I think the idea is also that the driver is signed by the distro, not Microsoft, so the risk of random drivers getting signed accidentally is probably much lower.

          • The Stoned Hacker@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 year ago

            depends, they can also loaded via dkms which may not require it

            • Skull giver@popplesburger.hilciferous.nl
              link
              fedilink
              English
              arrow-up
              2
              ·
              1 year ago

              deleted by creator

              • The Stoned Hacker@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                ·
                1 year ago

                It kinda depends, on custom kernels DKMS can be incredibly helpful. Like for a hardened kernel, a lot of drivers may be loaded via DKMS.

            • Justin@lemmy.jlh.name
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 year ago

              Yeah, it actually looks like Ubuntu leaves the module signing key accessible to root on the filesystem:

              https://wiki.ubuntu.com/UEFI/SecureBoot#Security_implications_in_Machine-Owner_Key_management

              So root access basically gives you kernel access, if you just sign a malicious kernel module with the MOK.

      • SpaceNoodle@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        That’s just a criticism of the Windows kernel.

cybersecurity@infosec.pub

cybersecurity@infosec.pub

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@infosec.pub

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

  • Be kind
  • Limit promotional activities
  • Non-cybersecurity posts should be redirected to other communities within infosec.pub.

Enjoy!

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 11 users / day
  • 160 users / week
  • 639 users / month
  • 1.79K users / 6 months
  • 55 local subscribers
  • 4.13K subscribers
  • 637 Posts
  • 1.66K Comments
  • Modlog
  • mods:
  • shellsharks@infosec.pub
  • tweedge@infosec.pub
  • BE: 0.19.8
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org