heroui logo

Windows Vulnerable Driver Loaded

Splunk Security Content

View Source
Summary
The 'Windows Vulnerable Driver Loaded' analytic is designed to detect the loading of known vulnerable Windows drivers, which may indicate potential persistence or privilege escalation attempts by attackers. Utilizing Sysmon's EventCode 6, this detection watches for driver loading events and cross-references these with a curated list of vulnerable drivers. The significance of this detection lies in the fact that many attackers exploit vulnerable drivers to gain elevated privileges or maintain persistence on compromised systems. If an attack is confirmed, it could enable arbitrary code execution with high privileges, possibly resulting in further system compromise and data exfiltration. The implementation of this rule requires the Sysmon tool to collect driver load events, which are then processed through a customized query that filters known vulnerabilities. It is essential to address potential false positives by refining the search criteria, such as verifying the driver version and its digital signature against known vulnerable states.
Categories
  • Windows
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
  • Network Traffic
ATT&CK Techniques
  • T1543.003
  • T1014
Created: 2024-11-13