Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

New Windows 10 Installations Require Signed Kernel Mode Drivers

Starting in Windows 10 version 1607, new kernel mode drivers will not be loaded unless they have been signed by Microsoft, the company announced.

Starting in Windows 10 version 1607, new kernel mode drivers will not be loaded unless they have been signed by Microsoft, the company announced.

The change, the Redmond-based tech giant says, will affect all new operating system installations, but will not affect users who are upgrading from older Windows versions. In fact, Microsoft says, drivers signed with a valid cross-signing certificate issued before July 29, 2015 do not need to be re-signed.

Microsoft announced in April last year that Windows 10 would require kernel mode drivers to be submitted to the Windows Hardware Developer Center Dashboard portal to be digitally signed. However, the company didn’t enforce the policy until now, “due to technical and ecosystem readiness issues,” Microsoft’s Joshua Baxter reveals.

Starting in version 1607, Windows 10 Code Integrity will enforce the new policy on kernel drivers and will block them from loading unless they have been properly signed, but only on new installations with Secure Boot onVersion 1607 is the platform’s Anniversary Update, scheduled to start rolling out on August 2.

The change, Baxter explains, should improve security in Windows 10 by limiting the risk of an end-user system being compromised by malicious drivers. However, he notes that the enforcement will happen only on fresh installations with Secure Boot on, and that it applies to new kernel mode drivers only.

Basically, computers upgrading from previous Windows releases will still benefit from the installation of cross-signed drivers, the same as those with Secure Boot OFF. Drivers signed with cross-signing certificate issued prior to July 29, 2015, when the initial policy went into place, will still be allowed. Previous versions of Windows will not be affected.

“To prevent systems from failing to boot properly, boot drivers will not be blocked, but they will be removed by the Program Compatibility Assistant. Future versions of Windows will block boot drivers,” Baxter notes.

Developers are encouraged to head to the Windows Hardware Developer Center Dashboard portal to sign their drivers to ensure compatibility. According to Microsoft, all new submissions need to be signed with an EV Code Signing Certificate, even if the developer is targeting older versions of Windows with their driver package.

Advertisement. Scroll to continue reading.

To sign drivers to ensure they are compatible with Windows 10 and previous Windows releases (Vista through Windows 8.1), developers need to run the HLK tests for Windows 10 and the HCK tests for Windows 8.1 and earlier versions, then using the Windows 10 HLK, merge the two test logs and submit the results, along with the driver, to the portal.

“The portal will sign the driver correctly such that it will work on all platforms that you indicate,” Baxter explains.

Related: Windows Information Protection to Address Data Leaks in Windows 10

Related: Researchers Use Disk Cleanup to Bypass UAC on Windows 10

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.