Microsoft CFG

Researchers from the University of Padua discovered a flaw that exists within the Control Flow Guard (CFG) in Microsoft Windows 8.1 and all versions of Windows 10. The CFG is a countermeasure Microsoft implemented to protect Windows-based systems from memory corruption vulnerabilities that exist in some software and is designed to prevent a threat actor from hijacking a program’s control flow and directing it towards malicious code. It is estimated that more than 500 million Windows systems currently have this protection in place. However, the researchers produced an exploit, dubbed Back to the Epilogue (BATE), that calls portions of code and chains them together to bypass CFG restrictions. The researchers have disclosed the vulnerability to Microsoft and plan to demonstrate the exploit at the Black Hat Asia conference in Singapore later this month. The NJCCIC recommends all users and administrators of systems running Windows 8.1 and 10 review the Dark Reading article and apply the appropriate patch when it becomes available.