I wonder if Microsoft checks these forums. Maybe there's a better place to post this question? It's been a year now.
Process Explorer - ProcExp152.sys Driver Flagged As Vulnerable
Hello-
We are leveraging a new security solution in our environment that adds protection to our endpoints. The XDR solution has a rule that is detecting the driver ProcExp152.sys as being "vulnerable". I have asked our security vendor to better explain and was provided this explanation.
The driver load/write that is blocked by this rule is a driver that has a known vulnerability in it. an attacker can use this vulnerability to gain privilege escalation and (among other things) disable the XDR agent.
So my question is: Does this driver in fact contain a known vulnerability and if so, if there a newer version which was fixed?
Sysinternals
11 answers
Sort by: Most helpful
-
-
lbpo92 1 Reputation point
2022-09-27T17:28:57.423+00:00 Hello,
I'm facing the same issue with my XDR solution.
But not the same behavior everywhere.
When the driver triggers an alert, it looks that this driver is located on the target endpoint to c:\windows\system32\drivers.
But, if I download the procexp64.exe tool from Microsoft to my computer, I run it and no problem with the XDR.
But I don't see any trace of this driver on my computer.
Maybe something related in a specific version ?
Did you find any solution ?
Thanks. -
Stefan Soller 6 Reputation points
2022-09-29T12:11:49.977+00:00 The driver is also mentioned here, but it is unclear which version is affected:
a-defenders-guide-for-rootkit-detection-episode-1-kernel-drivers
-
Dennis Seyersdahl 0 Reputation points
2023-03-13T13:47:13.0566667+00:00 I am also seeing this issue. Has there been any update from MS on this issue? I just put SentinelOne on Servers 2012R2 and it is detecting it as a threat and quarantining it.
-
Medal 0 Reputation points
2023-05-31T09:46:49.2633333+00:00 The issue is still occuring, SentinelOne blocking this driver and the procexp64.exe process due to signature being revoked.