Vulnerable driver loaded

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

7 Days

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

ATT&CK Tactic

Privilege Escalation (TA0004)

ATT&CK Technique

Exploitation for Privilege Escalation (T1068)

Severity

Medium

Description

A new and uncommon driver that is vulnerable was loaded.
Attackers may install a legitimate kernel driver and exploit its vulnerability to gain kernel access.

Attacker's Goals

Gain code execution on the host kernel.

Investigative actions

  • Check whether the driver was installed by IT / User.
  • Check if the host has the device of the driver - driver for Lenovo and the PC host brand is Asus.
  • Check driver file creation time and if in that time legitimate operations occur.