msrc.microsoft.com
Open in
urlscan Pro
2620:1ec:bdf::45
Public Scan
Submitted URL: https://go.redirectingat.com/?id=111346X1569483&url=https://msrc.microsoft.com/update-guide/vulnerability/ADV230001&xcust=2-1...
Effective URL: https://msrc.microsoft.com/update-guide/vulnerability/ADV230001
Submission: On July 17 via manual from US — Scanned from DE
Effective URL: https://msrc.microsoft.com/update-guide/vulnerability/ADV230001
Submission: On July 17 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
You need to enable JavaScript to run this app. Skip to contentMicrosoft MSRC Security Updates Acknowledgements Developer Feedback and support Sign in to your account Sign in Looking for email notifications? Please create your profile with your preferred email address to sign up for notifications. See our blog post for more information . Go to profile to subscribeHide for nowDon't show again 1. MSRC MSRC 2. Customer Guidance Customer Guidance 3. Security Update Guide Security Update Guide 4. Vulnerabilities Vulnerabilities 5. ADV 230001 ADV 230001 GUIDANCE ON MICROSOFT SIGNED DRIVERS BEING USED MALICIOUSLY On this page ADV230001Security Advisory Released: Jul 11, 2023 Assigning CNA: This CVE was issued by Microsoft Microsoft Impact: Defense in Depth Max Severity: None EXECUTIVE SUMMARY: Microsoft was recently informed that drivers certified by Microsoft’s Windows Hardware Developer Program (MWHDP) were being used maliciously in post-exploitation activity. In these attacks, the attacker gained administrative privileges on compromised systems before using the drivers. Microsoft has completed its investigation and determined that the activity was limited to the abuse of several developer program accounts and that no Microsoft account compromise has been identified. We’ve suspended the partners' seller accounts and implemented blocking detections for all the reported malicious drivers to help protect customers from this threat. Details: Microsoft was informed that drivers certified by Microsoft’s Windows Hardware Developer Program were being used maliciously in post-exploitation activity. In these attacks, the attacker had already gained administrative privileges on compromised systems prior to use of the drivers. An investigation was performed when we were notified of this activity by Sophos on February 9, 2023; Trend Micro and Cisco subsequently provided reports containing additional details. This investigation revealed that several developer accounts for the Microsoft Partner Center (MPC) were engaged in submitting malicious drivers to obtain a Microsoft signature. All the developer accounts involved in this incident were immediately suspended. Microsoft has released Window Security updates (see Security Updates table) that untrust drivers and driver signing certificates for the impacted files and has suspended the partners' seller accounts. Additionally, Microsoft has implemented blocking detections (Microsoft Defender 1.391.3822.0 and newer) to help protect customers from legitimately signed drivers that have been used maliciously in post-exploit activity. For more information about how the Windows Code Integrity feature protects Microsoft customers from revoked certificates see: (Notice of additions to the Windows Driver.STL revocation list - Microsoft Support)[https://support.microsoft.com/help/5029033]. Microsoft is working with Microsoft Active Protections Program (MAPP) partners to help develop further detections and to better protect our shared customers. Microsoft Partner Center is also working on long-term solutions to address these deceptive practices and prevent future customer impacts. RECOMMENDED ACTIONS: Microsoft recommends that all customers install the latest Windows updates and ensure their anti-virus and endpoint detection products are up to date with the latest signatures and are enabled to prevent these attacks. FREQUENTLY ASKED QUESTIONS: Are any Microsoft services (Azure, M365, XBOX, Etc.) affected by this issue? Microsoft’s services are not affected by this issue. Our investigation has not identified any instances of malicious drivers affecting any of our services. How can customers deploy their own Hypervisor-protected Code Integrity (HVCI) policy to perform detections in their own environment? Updates will be made to the Microsoft Recommended Driver Blocklist - Microsoft recommended driver block rules (Windows 10) - Windows security | Microsoft Docs policy to perform detections in their own environment. After the full set of malicious files has been locked, customers (enterprise and consumer) can deploy this policy onto devices to block against this malicious file and other malicious and vulnerable drivers on the blocklist. Additionally, enabling Hypervisor-protected Code Integrity (HVCI) will automatically enforce the policy without needing to deploy the policy. How do I determine if any drivers are affected that were installed prior to the available detections were implemented? Offline scans will be required to detect malicious drivers which might have been installed prior to March 2, 2023, when new Microsoft detections were implemented. For more information see Remove malware from your Windows PC. EXPLOITABILITY The following table provides an exploitability assessment for this vulnerability at the time of original publication. Publicly Disclosed Exploited Latest Software Release No Yes Exploitation Detected ACKNOWLEDGEMENTS * Sophos X-Ops teams * Chris Neal of Cisco Talos * Trend Micro Research Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure. See Acknowledgements for more information. SECURITY UPDATES To determine the support lifecycle for your software, see the Microsoft Support Lifecycle. Updates CVSS Release date Descending Edit columns Download Clear Release Date Product Platform Impact Max Severity Article Download Build Number Details Jul 11, 2023 Windows Server 2012 R2 (Server Core installation) - Defense in Depth None * 5028228 * 5028223 * Monthly Rollup * Security Only * 6.3.9600.21063 * 6.3.9600.21075 ADV230001 Jul 11, 2023 Windows Server 2012 R2 - Defense in Depth None * 5028228 * 5028223 * Monthly Rollup * Security Only * 6.3.9600.21063 * 6.3.9600.21075 ADV230001 Jul 11, 2023 Windows Server 2012 (Server Core installation) - Defense in Depth None * 5028232 * 5028233 * Monthly Rollup * Security Only * 6.2.9200.24374 * 6.2.9200.24374 ADV230001 Jul 11, 2023 Windows Server 2012 - Defense in Depth None * 5028232 * 5028233 * Monthly Rollup * Security Only * 6.2.9200.24374 * 6.2.9200.24374 ADV230001 Jul 11, 2023 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) - Defense in Depth None * 5028240 * 5028224 * Monthly Rollup * Security Only * 6.1.7601.26623 * 6.1.7601.26623 ADV230001 Jul 11, 2023 Windows Server 2008 R2 for x64-based Systems Service Pack 1 - Defense in Depth None * 5028240 * 5028224 * Monthly Rollup * Security Only * 6.1.7601.26623 * 6.1.7601.26623 ADV230001 Jul 11, 2023 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) - Defense in Depth None * 5028222 * 5028226 * Monthly Rollup * Security Only * 6.0.6003.22175 * 6.0.6003.22175 ADV230001 Jul 11, 2023 Windows Server 2008 for x64-based Systems Service Pack 2 - Defense in Depth None * 5028222 * 5028226 * Monthly Rollup * Security Only * 6.0.6003.22175 * 6.0.6003.22175 ADV230001 Jul 11, 2023 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) - Defense in Depth None * 5028222 * 5028226 * Monthly Rollup * Security Only * 6.0.6003.22175 * 6.0.6003.22175 ADV230001 Jul 11, 2023 Windows Server 2008 for 32-bit Systems Service Pack 2 - Defense in Depth None * 5028222 * 5028226 * Monthly Rollup * Security Only * 6.0.6003.22175 * 6.0.6003.22175 ADV230001 Jul 11, 2023 Windows Server 2016 (Server Core installation) - Defense in Depth None * 5028169 * Security Update * 10.0.14393.6085 ADV230001 Jul 11, 2023 Windows Server 2016 - Defense in Depth None * 5028169 * Security Update * 10.0.14393.6085 ADV230001 Jul 11, 2023 Windows 10 Version 1607 for x64-based Systems - Defense in Depth None * 5028169 * Security Update * 10.0.14393.6085 ADV230001 Jul 11, 2023 Windows 10 Version 1607 for 32-bit Systems - Defense in Depth None * 5028169 * Security Update * 10.0.14393.6085 ADV230001 Jul 11, 2023 Windows 10 for x64-based Systems - Defense in Depth None * 5028186 * Security Update * 10.0.10240.20048 ADV230001 Jul 11, 2023 Windows 10 for 32-bit Systems - Defense in Depth None * 5028186 * Security Update * 10.0.10240.20048 ADV230001 Jul 11, 2023 Windows 10 Version 22H2 for 32-bit Systems - Defense in Depth None * 5028166 * Security Update * 10.0.19045.3208 ADV230001 Jul 11, 2023 Windows 10 Version 22H2 for ARM64-based Systems - Defense in Depth None * 5028166 * Security Update * 10.0.19045.3208 ADV230001 Jul 11, 2023 Windows 10 Version 22H2 for x64-based Systems - Defense in Depth None * 5028166 * Security Update * 10.0.19045.3208 ADV230001 Jul 11, 2023 Windows 11 Version 22H2 for x64-based Systems - Defense in Depth None * 5028185 * Security Update * 10.0.22621.1992 ADV230001 Jul 11, 2023 Windows 11 Version 22H2 for ARM64-based Systems - Defense in Depth None * 5028185 * Security Update * 10.0.22621.1992 ADV230001 Jul 11, 2023 Windows 10 Version 21H2 for x64-based Systems - Defense in Depth None * 5028166 * Security Update * 10.0.19041.3208 ADV230001 Jul 11, 2023 Windows 10 Version 21H2 for ARM64-based Systems - Defense in Depth None * 5028166 * Security Update * 10.0.19041.3208 ADV230001 Jul 11, 2023 Windows 10 Version 21H2 for 32-bit Systems - Defense in Depth None * 5028166 * Security Update * 10.0.19041.3208 ADV230001 Jul 11, 2023 Windows 11 version 21H2 for ARM64-based Systems - Defense in Depth None * 5028182 * Security Update * 10.0.22000.2176 ADV230001 Jul 11, 2023 Windows 11 version 21H2 for x64-based Systems - Defense in Depth None * 5028182 * Security Update * 10.0.22000.2176 ADV230001 Jul 11, 2023 Windows Server 2022 (Server Core installation) - Defense in Depth None * 5028171 * Security Update * 10.0.20348.1850 ADV230001 Jul 11, 2023 Windows Server 2022 - Defense in Depth None * 5028171 * Security Update * 10.0.20348.1850 ADV230001 Jul 11, 2023 Windows Server 2019 (Server Core installation) - Defense in Depth None * 5028168 * Security Update * 10.0.17763.4645 ADV230001 Jul 11, 2023 Windows Server 2019 - Defense in Depth None * 5028168 * Security Update * 10.0.17763.4645 ADV230001 Jul 11, 2023 Windows 10 Version 1809 for ARM64-based Systems - Defense in Depth None * 5028168 * Security Update * 10.0.17763.4645 ADV230001 Jul 11, 2023 Windows 10 Version 1809 for x64-based Systems - Defense in Depth None * 5028168 * Security Update * 10.0.17763.4645 ADV230001 Jul 11, 2023 Windows 10 Version 1809 for 32-bit Systems - Defense in Depth None * 5028168 * Security Update * 10.0.17763.4645 ADV230001 All results loaded Loaded all 33 rows DISCLAIMER The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. REVISIONS version revisionDate description 1.0 Jul 11, 2023 Information published. How satisfied are you with the MSRC Security Update Guide? Not satisfied12345Very satisfied