Security News > 2022 > October > Microsoft realizes it hasn't updated list of banned dodgy Windows 10 drivers in years
Microsoft appears to have woken up and realized it may have left certain Windows Server and Windows 10 systems exposed to exploitable drivers for years.
This month it emerged the list of vulnerable drivers HVCI was supposed to be blocking was wildly out of date on machines running certain pre-Windows 11 operating systems, such as some Windows 10 and Windows Server builds.
Though there are other ways to block bad drivers, and with a more recent ban list, such as via WDAC, those who assumed HVCI was automatically protecting their Windows 10 PCs may not have realized its driver deny-list has not been updated since 2019.
In a note on Tuesday, Microsoft wrote that from the Windows 11 2022 update, the vulnerable driver blocking is enabled by default, rather than being opt in, for all capable devices.
In other words, the latest Windows releases get an updated banned driver list, and soon older Windows 10 and Server editions will finally get an updated verboten driver list that should work as expected, if blocking is enabled.
Redmond quietly admitted its block list has been out of date in the release notes for an October preview release for Windows 10, Windows 11, and Windows Server.
News URL
Related news
- Microsoft fixes Windows 10 bug causing apps to stop working (source)
- Microsoft just killed the Windows 10 Beta Channel again (source)
- Microsoft just killed the Windows 10 Beta Channel for good (source)
- Microsoft pulls WinAppSDK update breaking Windows 10 app uninstalls (source)
- Microsoft fixes Windows KB5043145 reboot loops, USB and Bluetooth issues (source)
- What Is Inside Microsoft’s Major Windows 11 Update? (source)
- Microsoft warns of Windows 11 24H2 gaming performance issues (source)
- Microsoft blocks Windows 11 24H2 on some Intel PCs over BSOD issues (source)
- Microsoft Office 2024 now available for Windows and macOS users (source)
- Windows 10 KB5044273 update released with 9 fixes, security updates (source)