{"id":4200,"date":"2025-07-04T10:52:05","date_gmt":"2025-07-04T10:52:05","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=4200"},"modified":"2025-07-04T10:52:05","modified_gmt":"2025-07-04T10:52:05","slug":"writable-file-in-lenovo-path-lets-attackers-evade-applocker-restrictions","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=4200","title":{"rendered":"Writable File in Lenovo Path Lets Attackers Evade AppLocker Restrictions"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>A safety researcher has uncovered a major vulnerability affecting Lenovo computer systems: a writable file inside the Home windows listing that may be exploited to bypass AppLocker restrictions.<\/p>\n<p>The file in query, C:WindowsMFGSTAT.zip, is current on many Lenovo machines that ship with the producer\u2019s default Home windows picture.<\/p>\n<p>This subject, initially thought to have an effect on solely a handful of gadgets, has now been confirmed throughout a variety of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/it-lifecycle-management-for-enhanced-enterprise-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lenovo<\/a> fashions.<\/p>\n<h2 class=\"wp-block-heading\"><strong>The Technical Concern<\/strong><\/h2>\n<p>The vulnerability facilities on the file permissions of MFGSTAT.zip. Utilizing entry management checking instruments, it was found that any authenticated consumer on the system may write to this file.<\/p>\n<p>A evaluation of the file\u2019s Entry Management Lists (ACLs) in Home windows Explorer confirmed that normal customers have each write and execute permissions.<\/p>\n<p>That is problematic as a result of, underneath default AppLocker guidelines, any executable inside the C:Home windows listing is allowed to run. Because of this, the writable MFGSTAT.zip file turns into a possible vector for attackers to evade AppLocker\u2019s utility whitelisting.<\/p>\n<p><strong>Exploitation Technique<\/strong><\/p>\n<p>To use this vulnerability, an attacker doesn&#8217;t have to overwrite the zip file instantly. As a substitute, they will leverage Home windows\u2019 alternate information streams (ADS) characteristic.<\/p>\n<p>By including a malicious binary as an alternate information stream to MFGSTAT.zip, an attacker can execute arbitrary code. For instance, the next command provides an executable to the ADS:<\/p>\n<pre class=\"wp-block-code\"><code>sort c:tempautoruns.exe &gt; c:windowsmfgstat.zip:this<\/code><\/pre>\n<p>The attacker can then execute the payload utilizing a professional <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/new-devman-ransomware-by-dragonforce\/\" target=\"_blank\" rel=\"noreferrer noopener\">Home windows <\/a>utility, corresponding to appvlp.exe from Microsoft Workplace:<\/p>\n<pre class=\"wp-block-code\"><code>\"C:Program Information (x86)Microsoft OfficerootClientappvlp.exe\" c:Windowsmfgstat.zip:this<\/code><\/pre>\n<p>This system permits the attacker to run unauthorized code, successfully bypassing AppLocker\u2019s restrictions.<\/p>\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"621\" height=\"721\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/07\/image-8.png\" alt=\"\" class=\"wp-image-147503\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/07\/image-8.png 621w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/07\/image-8-258x300.png 258w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/07\/image-8-362x420.png 362w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/07\/image-8-150x174.png 150w, https:\/\/gbhackers.com\/wp-content\/uploads\/2025\/07\/image-8-300x348.png 300w\" sizes=\"(max-width: 621px) 100vw, 621px\"\/><\/figure>\n<p>Upon being notified, Lenovo\u2019s Product Safety Incident Response Group (PSIRT) acknowledged the difficulty however opted to not launch a patch.<\/p>\n<p>As a substitute, Lenovo revealed steering recommending the removing of the susceptible file. The corporate supplied a number of strategies for deletion:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>PowerShell:<\/strong><br \/>Take away-Merchandise -Path \u201cC:WindowsMFGSTAT.zip\u201d -Drive<\/li>\n<li><strong>Command Immediate:<\/strong><br \/>del \/A:H C:WindowsMFGSTAT.zip<\/li>\n<li><strong>Home windows File Explorer:<\/strong><br \/>Navigate to C:Home windows, present hidden objects, right-click MFGSTAT.zip, and choose \u201cDelete\u201d.<\/li>\n<\/ul>\n<p>Lenovo famous that organizations deploying their very own Home windows photographs will not be affected, because the file is restricted to the preloaded Lenovo working system.<\/p>\n<p>This <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/support.lenovo.com\/in\/en\/product_security\/HT517812\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">discovery<\/a> highlights the significance of scrutinizing default file permissions, particularly in system directories.<\/p>\n<p>Whereas Lenovo\u2019s steering mitigates the chance, the incident serves as a reminder that even minor oversights in system configuration can have vital safety penalties.<\/p>\n<p>Lenovo has credited the researcher for responsibly disclosing the difficulty and encourages all customers of affected methods to take away the file promptly.<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong>Unique Webinar Alert: Harnessing Intel\u00ae Processor Improvements for Superior API Safety \u2013<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.brighttalk.com\/webcast\/12229\/645198?utm_source=Intel&amp;utm_medium=brighttalk&amp;utm_campaign=645198\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\u00a0Register for Free<\/a><\/strong><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>A safety researcher has uncovered a major vulnerability affecting Lenovo computer systems: a writable file inside the Home windows listing that may be exploited to bypass AppLocker restrictions. The file in query, C:WindowsMFGSTAT.zip, is current on many Lenovo machines that ship with the producer\u2019s default Home windows picture. This subject, initially thought to have an [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4202,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[3794,1629,1164,2849,3793,265,1013,3795,3792],"class_list":["post-4200","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-applocker","tag-attackers","tag-evade","tag-file","tag-lenovo","tag-lets","tag-path","tag-restrictions","tag-writable"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/4200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4200"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/4200\/revisions"}],"predecessor-version":[{"id":4201,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/4200\/revisions\/4201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/4202"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-13 17:36:47 UTC -->