Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft’s AppLocker Flaw Allows Malicious Apps to Run and Bypass Restrictions

Microsoft’s AppLocker Flaw Allows Malicious Apps to Run and Bypass Restrictions

Posted on July 21, 2025July 21, 2025 By CWS

A vital configuration flaw in Microsoft’s AppLocker block record coverage has been found, revealing how attackers might probably bypass safety restrictions via a refined versioning error. 

The problem facilities on an incorrect MaximumFileVersion worth that creates an exploitable hole in Microsoft’s utility management framework, highlighting the significance of exact safety coverage implementation in enterprise environments.

Key Takeaways1. Incorrect MaximumFileVersion (65355 vs 65535) opens an AppLocker bypass.2. Tampered binaries lose legitimate signatures, so signed-only insurance policies nonetheless cease assaults.3. Repair by updating the block-list worth and auditing all copied safety configs.

AppLocker Config Vulnerability

Varonis Risk Labs stories that the vulnerability stems from a seemingly minor however vital discrepancy in Microsoft’s recommended AppLocker configuration. 

Researchers discovered that the MaximumFileVersion discipline was incorrectly set to 65355.65355.65355.65355 as an alternative of the anticipated 65535.65535.65535.65535. 

This error creates a model vary hole that malicious actors might exploit to bypass utility restrictions.

The problematic configuration seems in Microsoft’s block record as:

Since 65535 represents the utmost worth for an unsigned 16-bit integer, any executable with a model quantity between 65355.65355.65355.65355 and 65535.65535.65535.65535 might theoretically slip via the coverage enforcement. 

An attacker might modify a blocked executable’s model metadata to exceed the configured most, permitting it to execute regardless of being on the block record.

Whereas this discovery initially seems regarding, the sensible safety impression is considerably mitigated by Microsoft‘s layered safety method. 

The AppLocker block record coverage is designed to work together with code signing necessities that solely allow signed executables to run on the system. 

When an attacker modifies an executable’s model data, this course of inevitably breaks the file’s digital signature, inflicting the modified file to be blocked by the broader “signed executables solely” rule.

This multilayered safety design demonstrates that even when one management mechanism has a flaw, complementary safety measures can stop exploitation.

Nevertheless, organizations relying solely on the block record with out implementing code signing insurance policies might probably be weak to this bypass method.

Microsoft Addresses Documentation Supply

Investigation into the error’s origin traced it again to Microsoft’s personal documentation. The inaccurate 65355 worth appeared in Microsoft’s Publish Web page documentation, which has since been corrected following Varonis’s accountable disclosure. 

This incident underscores how documentation errors can propagate into manufacturing safety insurance policies when directors copy configurations with out thorough validation.

The invention serves as a reminder that safety professionals should rigorously overview all coverage configurations, keep away from blind copy-pasting of safety guidelines, and implement defense-in-depth methods. 

Organizations utilizing AppLocker ought to think about updating their MaximumFileVersion settings to correct values and guarantee complete utility management insurance policies are in place to stop potential bypasses.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:AppLocker, Apps, Bypass, Flaw, Malicious, Microsofts, Restrictions, Run

Post navigation

Previous Post: Weak Password Let Ransomware Gang Destroy 158-Year-Old Company
Next Post: China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure

Related Posts

Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise Cyber Security News
Alice Blue Partners With AccuKnox For Regulatory Compliance Alice Blue Partners With AccuKnox For Regulatory Compliance Cyber Security News
Washington Post Journalists’ Microsoft Accounts Hacked in Targetetd Cyberattack Washington Post Journalists’ Microsoft Accounts Hacked in Targetetd Cyberattack Cyber Security News
Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’ Threats Actors Poisoned Bing Search Results to Deliver Bumblebee Malware if User Searched for ‘ManageEngine OpManager’ Cyber Security News
Microsoft Exchange Online to Deprecate SMTP AUTH Basic Authentication for Tenants Microsoft Exchange Online to Deprecate SMTP AUTH Basic Authentication for Tenants Cyber Security News
Cyberattack Hits European Commission’s AWS Account Cyberattack Hits European Commission’s AWS Account Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark