Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions
3 Articles
3 Articles
Writable File In Lenovo Path Lets Attackers Evade AppLocker Restrictions - Cybernoz - Cybersecurity News
A security researcher has uncovered a significant vulnerability affecting Lenovo computers: a writable file within the Windows directory that can be exploited to bypass AppLocker restrictions. The file in question, C:WindowsMFGSTAT.zip, is present on many Lenovo machines that ship with the manufacturer’s default Windows image. This issue, initially thought to affect only a handful of devices, has now been confirmed across a wide range of Lenovo …


Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions
A security researcher has uncovered a significant vulnerability affecting Lenovo computers: a writable file within the Windows directory that can be exploited to bypass AppLocker restrictions. The file in question, C:\Windows\MFGSTAT.zip, is present on many Lenovo machines that ship with the manufacturer’s default Windows image. This issue, initially thought to affect only a handful of […] The post Writable File in Lenovo Path Lets Attackers Eva…
Coverage Details
Bias Distribution
- There is no tracked Bias information for the sources covering this story.
To view factuality data please Upgrade to Premium