Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspective
Briefly

Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspective
The material presents a technical approach for determining how many Windows kernel mode drivers can be interacted with from user mode without the hardware they were built for. The goal is to assess whether a specific driver vulnerability stays reachable, and therefore potentially exploitable, when the hardware gate is absent. The work focuses on attack surface and, to some extent, Windows Plug and Play behavior rather than a particular bug class. Tests were performed on Windows 11 23H2. The discussion assumes familiarity with Windows driver concepts, especially device objects, and uses driver-oriented vulnerability research motivations, including evaluating offensive value for scenarios like BYOVD attacks.
"This article provides a technical analysis of how many Windows kernel mode drivers can be interacted with from user mode without the hardware they were developed for. This work was motivated by driver-oriented vulnerability research and the need to evaluate the exploitability of individual findings, which frequently affect code whose reachability is hardware-gated. The methodology presented here should help anyone determine whether a particular Windows kernel mode driver vulnerability remains reachable - and thus potentially exploitable - even in the absence of the hardware the driver was developed for."
"In addition to the obvious Local Privilege Escalation potential, vulnerable drivers are often abused in BYOVD attacks - a post-exploitation technique leveraged by attackers to disrupt system defenses such as EDR components. Two main criteria determine whether a driver vulnerability is a strong candidate for BYOVD attacks: 1. Exploitation allows meaningful disruption of an otherwise tamper-resistant security component. Examples include kernel-level vulnerabilities granting arbitrary memory read/write access, arbitrary code execution, or arbitrary resource abuse (e.g., overwriting files, closing handles, or terminating"
Read at The Hacker News
Unable to calculate read time
[
|
]