
A few years ago, Microsoft announced a new tool - AppLocker, which, according to the developers, was designed to improve security when working in Windows. Not so long ago, researcher Casey Smith discovered a vulnerability in this functionality that allows him to bypass it. Smith found a way in which you can run any application on the system bypassing AppLocker and without administrator rights.
What is AppLocker
Microsoft's AppLocker works on the basis of black and white lists of applications that can be running on the system. It began to be delivered as a component of the Win 7 and WinServer 2008 R2 operating systems. With it, system administrators were able to create rules for running executable files
.exe
,
.com
, as well as files with extensions
.msi
,
.msp
,
.bat
,
.scr
,
.js
,
.dll
and others.
What is the difference between AppLocker and Software Restriction Policies (SRP)? In the big case, not many, but according to some security experts, mainly the level of marketing. With more detailed information on how in general works AppLocker can be
read on sysadmins.lv .
')
The essence
Smith discovered that through a
call to Regsvr32
you can run any file to bypass AppLocker policies, and this does not even require administrator rights, which, as you know, ordinary users are always “cut”.
The scripts for bypassing AppLocker through
Regsvr32
are posted by the author on GitHub , see them
here .
According to
engadget , Microsoft has not yet provided any official comments on this issue, so it is not known whether this vulnerability will be “patched” by patch or not.
On the other hand, the AppLocker bypass problem can be solved in a very simple way: block Regsvr32 in the system's firewall, thus excluding external access to it via the Network. Another solution is to enable the
rules for DLLs , which are disabled by default due to performance drops.
There are also several other ways to bypass AppLocker
mentioned in the comments by the user
navion :
one and
two .