- Apr 24, 2016
Microsoft has recently addressed a weakness in the Microsoft Defender Antivirus on Windows that allowed attackers to plant and execute malicious payloads without triggering Defender's malware detection engine.
This security flaw [1, 2] affected the latest Windows 10 versions, and threat attackers could abuse it since at least 2014.
As BleepingComputer previously reported, the flaw resulted from lax security settings for the "HKLM\Software\Microsoft\Windows Defender\Exclusions" Registry key. This key contains the list of locations (files, folders, extensions, or processes) excluded from Microsoft Defender scanning.
Exploiting the weakness was possible because the Registry key was accessible by the 'Everyone' group.