Process Explorer - ProcExp152.sys Driver Flagged As Vulnerable

Marc Denman 76 Reputation points
2022-08-31T17:36:54.77+00:00

Hello-

We are leveraging a new security solution in our environment that adds protection to our endpoints. The XDR solution has a rule that is detecting the driver ProcExp152.sys as being "vulnerable". I have asked our security vendor to better explain and was provided this explanation.

The driver load/write that is blocked by this rule is a driver that has a known vulnerability in it. an attacker can use this vulnerability to gain privilege escalation and (among other things) disable the XDR agent.

So my question is: Does this driver in fact contain a known vulnerability and if so, if there a newer version which was fixed?

Sysinternals
Sysinternals
Advanced system utilities to manage, troubleshoot, and diagnose Windows and Linux systems and applications.
1,258 questions
{count} votes

11 answers

Sort by: Most helpful
  1. Marc Denman 76 Reputation points
    2023-01-13T13:56:58.9933333+00:00

    Thanks all for the additional comments/information. I certainly hope someone from the Microsoft team can look into this and offer some explanation or ideas to resolve.

    Some additional information that I learned since posting this question originally.

    In our cases, the alert was being triggered and execution blocked due to the customers executing ProcessExplorer with elevated privilege (aka "as admin/system"). In this case the driver is loaded with same so is flagged because the driver "could be used by a threat actor to cause harm". Seems when the application is run normally, the issue is not the same as access to manipulate the system via the driver privileges is not available.

    5 people found this answer helpful.
    0 comments No comments

  2. Swiecicki, Tomasz 16 Reputation points
    2022-09-28T13:56:20.5+00:00

    Code signing certificate expired December 2, 2021 on Procexp64.exe 16.43 (latest). Would it be possible to republish the utils with valid signature?

    I have just received the alert and a tip, that the signing certificate may be responsible.

    3 people found this answer helpful.

  3. Stefan Soller 6 Reputation points
    2022-09-29T11:26:34.327+00:00

    I also have a similar question because the file ProcExp152.sys is also blocked by the security solution of a customer.

    The tool handle in version 4.22 from Sysinternals is used there, which installs the ProcExp152.sys driver in version 16.27.0.0, which does not correspond to the latest version. Is this driver version a security problem or not? Is there an updated version of handle.exe that includes the latest driver?

    Does anyone know of a Command Line / PowerShell command to unload the system driver without rebooting?

    Many Thanks.

    1 person found this answer helpful.

  4. Henk Poley 6 Reputation points
    2023-01-13T13:34:48.41+00:00

    Just a heads up that apart from Elastic Endpoint Security Solution, now also Sentinel One blocks PROCEXP152.SYS by default. Even for the legitimate Process Explorer loading this driver.

    Maybe discuss with them what the issue is, and how to resolve it?

    1 person found this answer helpful.

  5. Lowell Picklyk 10 Reputation points
    2023-01-19T17:36:39.4966667+00:00

    We're seeing this issue as well. Looks like it may only happen when PE is run as an administrator.

    1 person found this answer helpful.

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.