Improper verification of cryptographic signature in App Control for Business (WDAC) allows an unauthorized attacker to bypass a security feature locally.
What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker can spoof the signature to get it to bypass App Control policy. According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L), and integrity (I:L) but lead to no loss of availability (A:N). What is the impact of this vulnerability? An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality), make changes to disclosed information (Integrity), but cannot limit access to the resource (Availability).
Christopher Whipp with Services Australia, <a href="https://www.linkedin.com/in/mingda-li-470b7b90">Mingda Li</a> with <a href="https://www.dow.com/en-us">Dow</a>