


To report an issue or request a change to the vulnerable driver blocklist, including updating a block rule once a driver vulnerability has been patched, visit the Microsoft Security Intelligence portal or submit feedback on this article. For more information about driver submission, see Improve kernel security with the new Microsoft Vulnerable and Malicious Driver Reporting Center. Behaviors that aren't malicious but circumvent the Windows Security Model and can be exploited by attackers to elevate privileges in the Windows kernelĭrivers can be submitted to Microsoft for security analysis at the Microsoft Security Intelligence Driver Submission page.Malicious behaviors (malware) or certificates used to sign malware.Known security vulnerabilities that can be exploited by attackers to elevate privileges in the Windows kernel.The vulnerable driver blocklist is designed to help harden systems against third party-developed drivers across the Windows ecosystem with any of the following attributes: When vulnerabilities in drivers are found, we work with our partners to ensure they're quickly patched and rolled out to the ecosystem. Microsoft works closely with our IHVs and security community to ensure the highest level of driver security for our customers. One of the many strengths of the Windows platform is our strong collaboration with independent hardware vendors (IHVs) and OEMs.

So, malicious actors are turning to exploit vulnerabilities in legitimate and signed kernel drivers to run malware in kernel. Microsoft has strict requirements for code running in kernel. Learn more about the Windows Defender Application Control feature availability. Some capabilities of Windows Defender Application Control are only available on specific Windows versions.
