22.7 (L1) Ensure 'ASR: Block abuse of exploited vulnerable signed drivers' is set to 'Block'

Information

This rule prevents an application from writing a vulnerable signed driver to disk.

The recommended state for this setting is: Block

Note: The

Block abuse of exploited vulnerable signed drivers

rule does not block a driver that already exists on the system from being loaded.

Attack surface reduction helps prevent actions and apps that are typically used by exploit-seeking malware to infect systems.

Vulnerable signed drivers can be exploited by local applications that have sufficient privileges to gain access to the kernel. This enables attackers to disable or circumvent security solutions, eventually leading to system compromise.

Solution

To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Block

Defender\Block abuse of exploited vulnerable signed drivers (Device)

Impact:

When a rule is triggered, a notification will be displayed from the Action Center.

See Also

https://workbench.cisecurity.org/benchmarks/21719

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-16, CSCv7|8.3

Plugin: Windows

Control ID: 6356d90db09277cf30549e04d4d9a4f454b88b7f43c23a8deb4e41c30eef2847