| ▲ | EvanAnderson 5 hours ago | ||||||||||||||||||||||||||||
AV had traditionally run as SYSTEM on Windows (and, in the past, often had kernel mode drivers too). I've always thought it was a terrible idea. It opens up exciting new attack surfaces. Kaspersky and McAfee both had privilege escalation vulnerabilities that I can recall. There have been a ton in multiple products over the years. | |||||||||||||||||||||||||||||
| ▲ | labelbabyjunior 5 hours ago | parent | next [-] | ||||||||||||||||||||||||||||
They kind of have to, though. If malware exploits a privilege escalation vuln, what's the AV going to do about it when it's reduced to the software equivalent of a UK police officer? Observe and report? Stop or I'll say "stop" again? AV requires great power, which requires great responsibility. The second part is what often eludes AV developers. | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| ▲ | Fokamul 4 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||
Because to get Ring0, you just need signed vulnerable driver. There are tons of signed drivers to explore ;-) | |||||||||||||||||||||||||||||