A security researcher has uncovered a significant vulnerability affecting Lenovo computers: a writable file within the Windows directory that can be exploited to bypass AppLocker restrictions. The file in question, C:\Windows\MFGSTAT.zip, is present on many Lenovo machines that ship with the manufacturer’s default Windows image. This issue, initially thought to affect only a handful of […]
The post Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Titel: GBHackers On Security
Link: https://gbhackers.com/writable-file-in-lenovo-path-attackers-evade-applocker/
2Staff B.V.
Europalaan 2
5232 BV 's-Hertogenbosch
T 030- 600 5000
F 030- 600 5001
E info@2staff.nl