"Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel"
Attackers could use a new technique to evade Microsoft's Driver Signature Enforcement (DSE) on fully patched Windows systems, resulting in Operating System (OS) downgrade attacks. According to SafeBreach researcher Alon Leviev, this bypass enables attackers to deploy custom rootkits capable of neutralizing security controls, hiding processes and network activity, maintaining stealth, and more by loading unsigned kernel drivers. This article continues to discuss the OS downgrade flaw.
THN reports "Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel"
Submitted by Gregory Rigby
on