Process Explorer - ProcExp152.sys Driver Flagged As Vulnerable

Marc Denman 66 Reputation points
2022-08-31T17:36:54.77+00:00

Hello-

We are leveraging a new security solution in our environment that adds protection to our endpoints. The XDR solution has a rule that is detecting the driver ProcExp152.sys as being "vulnerable". I have asked our security vendor to better explain and was provided this explanation.

The driver load/write that is blocked by this rule is a driver that has a known vulnerability in it. an attacker can use this vulnerability to gain privilege escalation and (among other things) disable the XDR agent.

So my question is: Does this driver in fact contain a known vulnerability and if so, if there a newer version which was fixed?

Sysinternals
Sysinternals
Advanced system utilities to manage, troubleshoot, and diagnose Windows and Linux systems and applications.
1,082 questions
{count} votes

10 answers

Sort by: Most helpful
  1. Marc Denman 66 Reputation points
    2023-01-13T13:56:58.9933333+00:00

    Thanks all for the additional comments/information. I certainly hope someone from the Microsoft team can look into this and offer some explanation or ideas to resolve.

    Some additional information that I learned since posting this question originally.

    In our cases, the alert was being triggered and execution blocked due to the customers executing ProcessExplorer with elevated privilege (aka "as admin/system"). In this case the driver is loaded with same so is flagged because the driver "could be used by a threat actor to cause harm". Seems when the application is run normally, the issue is not the same as access to manipulate the system via the driver privileges is not available.

    5 people found this answer helpful.
    0 comments No comments

  2. Swiecicki, Tomasz 11 Reputation points
    2022-09-28T13:56:20.5+00:00

    Code signing certificate expired December 2, 2021 on Procexp64.exe 16.43 (latest). Would it be possible to republish the utils with valid signature?

    I have just received the alert and a tip, that the signing certificate may be responsible.

    2 people found this answer helpful.

  3. Stefan Soller 6 Reputation points
    2022-09-29T11:26:34.327+00:00

    I also have a similar question because the file ProcExp152.sys is also blocked by the security solution of a customer.

    The tool handle in version 4.22 from Sysinternals is used there, which installs the ProcExp152.sys driver in version 16.27.0.0, which does not correspond to the latest version. Is this driver version a security problem or not? Is there an updated version of handle.exe that includes the latest driver?

    Does anyone know of a Command Line / PowerShell command to unload the system driver without rebooting?

    Many Thanks.

    1 person found this answer helpful.

  4. Lowell Picklyk 5 Reputation points
    2023-01-19T17:36:39.4966667+00:00

    We're seeing this issue as well. Looks like it may only happen when PE is run as an administrator.

    1 person found this answer helpful.

  5. lbpo92 1 Reputation point
    2022-09-27T17:28:57.423+00:00

    Hello,
    I'm facing the same issue with my XDR solution.
    But not the same behavior everywhere.
    When the driver triggers an alert, it looks that this driver is located on the target endpoint to c:\windows\system32\drivers.
    But, if I download the procexp64.exe tool from Microsoft to my computer, I run it and no problem with the XDR.
    But I don't see any trace of this driver on my computer.
    Maybe something related in a specific version ?
    Did you find any solution ?
    Thanks.

    0 comments No comments