Researchers from Offensive Security have found a way to disable the protection systems provided by the latest version of Microsoft’s Enhanced Mitigation Experience Toolkit (EMET).
EMET is designed to prevent software vulnerabilities from being exploited by using various mitigation technologies, including Structured Exception Handler Overwrite Protection (SEHOP), Data Execution Prevention (DEP), Heapspray Allocations, Null page allocation, Mandatory Address Space Layout Randomization (ASLR), Export Address Table Access Filtering (EAF) and Return Oriented Programming (ROP) mitigations.
Research papers such as “Bypassing EMET 4.1” and “EMET 4.1 Uncovered” detail mitigation bypass methods, but Offensive Security has focused on disarming EMET, rather than on bypassing mitigations, as this method gives an attacker the ability use generic shellcodes such as the ones generated by Metasploit. This also represents a generic way of disabling all protections, and “not having to rely on functions that are not critical to EMET when trying to defeat the MemProt ROP protection, especially when having ‘Deep Hooks’ enabled,” the company said.
The researchers managed to disarm EMET and get a shell after finding a global variable in the .data section of the EMET.dll file. The said variable, which is located on a memory page marked with read/write permissions, acts as a switch to enable or disable all the ROP protections at runtime.
“If we manage to zero out the general switch, all the ROP mitigations implemented by EMET would be disabled. This requires an attacker to build a ROP chain that will dynamically retrieve the base address of EMET.dll and overwrite the global variable with a zero,” Offensive Security wrote in a blog post.
Initially, experts only managed to get a shell by executing the exploit with a debugger attached, due to EMET’s EAF checks. However, they’ve succeeded in getting a shell outside the debugger after disarming EAF with a method described by security researcher Piotr Bania in January 2012.
The researchers tested their findings on Windows 7, Internet Explorer 8 and EMET 4.1 update 1. Offensive Security says Microsoft appears to be aware of the attack method since the company addressed the issue in the technical preview versions of EMET 5 and later. Microsoft could not immediately be reached for comment.
The exploit code for disarming EMET has been made available by Offensive Security. The company has also published a video to demonstrate the attack which is embedded below.
Disarming Enhanced Mitigation Experience Toolkit (EMET) from Offensive Security on Vimeo.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
