Hard link based file access bypass vulnerability

Yeyixiao

Member
Currently, for protected files not in the secure volume, an attacker can search for already opened file handles in the system, duplicate them and create hard links, thus completely bypassing MP's protection (MP currently does not look up if the actual file the target hard link points to is protected). Also, set hard link in advance can achieve this purpose before MP is set to protect (and with a higher success rate).
A possible solution would be to add further retrieval for hard links in callback function, though that may cause some extra IO occupation.
The suggestion for current users is to place critical files into the secure volume, and add a device level "protect" like this:"Device\ImDisk\*"
 
A possible workaround might be not allowing anyone to use mklink.exe and possibly restricting the use of powershell.
 
It cannot solve the real problem,any elavted applications can call APIs directly without mklink.exe.

Then Windows security is to question, if they provide an API they don't allow to be restricted. Well, then it is something MP can (or has to) solve.
 
Back
Top