Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft’s AppLocker Flaw Allows Malicious Apps to Run and Bypass Restrictions

Posted on July 21, 2025July 21, 2025 By CWS

A vital configuration flaw in Microsoft’s AppLocker block record coverage has been found, revealing how attackers might probably bypass safety restrictions via a refined versioning error. 

The problem facilities on an incorrect MaximumFileVersion worth that creates an exploitable hole in Microsoft’s utility management framework, highlighting the significance of exact safety coverage implementation in enterprise environments.

Key Takeaways1. Incorrect MaximumFileVersion (65355 vs 65535) opens an AppLocker bypass.2. Tampered binaries lose legitimate signatures, so signed-only insurance policies nonetheless cease assaults.3. Repair by updating the block-list worth and auditing all copied safety configs.

AppLocker Config Vulnerability

Varonis Risk Labs stories that the vulnerability stems from a seemingly minor however vital discrepancy in Microsoft’s recommended AppLocker configuration. 

Researchers discovered that the MaximumFileVersion discipline was incorrectly set to 65355.65355.65355.65355 as an alternative of the anticipated 65535.65535.65535.65535. 

This error creates a model vary hole that malicious actors might exploit to bypass utility restrictions.

The problematic configuration seems in Microsoft’s block record as:

Since 65535 represents the utmost worth for an unsigned 16-bit integer, any executable with a model quantity between 65355.65355.65355.65355 and 65535.65535.65535.65535 might theoretically slip via the coverage enforcement. 

An attacker might modify a blocked executable’s model metadata to exceed the configured most, permitting it to execute regardless of being on the block record.

Whereas this discovery initially seems regarding, the sensible safety impression is considerably mitigated by Microsoft‘s layered safety method. 

The AppLocker block record coverage is designed to work together with code signing necessities that solely allow signed executables to run on the system. 

When an attacker modifies an executable’s model data, this course of inevitably breaks the file’s digital signature, inflicting the modified file to be blocked by the broader “signed executables solely” rule.

This multilayered safety design demonstrates that even when one management mechanism has a flaw, complementary safety measures can stop exploitation.

Nevertheless, organizations relying solely on the block record with out implementing code signing insurance policies might probably be weak to this bypass method.

Microsoft Addresses Documentation Supply

Investigation into the error’s origin traced it again to Microsoft’s personal documentation. The inaccurate 65355 worth appeared in Microsoft’s Publish Web page documentation, which has since been corrected following Varonis’s accountable disclosure. 

This incident underscores how documentation errors can propagate into manufacturing safety insurance policies when directors copy configurations with out thorough validation.

The invention serves as a reminder that safety professionals should rigorously overview all coverage configurations, keep away from blind copy-pasting of safety guidelines, and implement defense-in-depth methods. 

Organizations utilizing AppLocker ought to think about updating their MaximumFileVersion settings to correct values and guarantee complete utility management insurance policies are in place to stop potential bypasses.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:AppLocker, Apps, Bypass, Flaw, Malicious, Microsofts, Restrictions, Run

Post navigation

Previous Post: Weak Password Let Ransomware Gang Destroy 158-Year-Old Company
Next Post: China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure

Related Posts

NailaoLocker Ransomware Attacking Windows Systems Using Chinese SM2 Cryptographic Standard Cyber Security News
Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware Cyber Security News
Building a Cyber Incident Response Plan That Works Cyber Security News
Mitigating Malware Threats on Unmanaged Endpoint Devices Cyber Security News
Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms Cyber Security News
Role of Threat Intelligence in Proactive Defense Strategies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Strengthening Security Measures In Digital Advertising Platforms
  • Mitel Patches Critical Flaw in Enterprise Communication Platform
  • Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency
  • Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks
  • Overcoming Risks from Chinese GenAI Tool Usage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Strengthening Security Measures In Digital Advertising Platforms
  • Mitel Patches Critical Flaw in Enterprise Communication Platform
  • Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency
  • Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks
  • Overcoming Risks from Chinese GenAI Tool Usage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News